Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample Name:file.exe
Analysis ID:756298
MD5:f39dbbcdcaac9c8d2039b855c752c214
SHA1:ab36da0a55feab685587c52bce5268fca7ef0e23
SHA256:12675d0f7c4a8d729eda453ad01697b0790f2921258e9befc54cf9327156aa10
Tags:exe
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Benign windows process drops PE files
Malicious sample detected (through community Yara rule)
Yara detected SmokeLoader
System process connects to network (likely due to code injection or exploit)
Detected unpacking (changes PE section rights)
Antivirus detection for URL or domain
Maps a DLL or memory area into another process
Found evasive API chain (may stop execution after checking mutex)
Writes to foreign memory regions
Checks if browser processes are running
Machine Learning detection for sample
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Injects code into the Windows Explorer (explorer.exe)
Deletes itself after installation
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Contains functionality to compare user and computer (likely to detect sandboxes)
Checks if the current machine is a virtual machine (disk enumeration)
Uses 32bit PE files
Found decision node followed by non-executed suspicious APIs
Yara signature match
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
May sleep (evasive loops) to hinder dynamic analysis
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
PE file contains executable resources (Code or Archives)
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops files with a non-matching file extension (content does not match file extension)
Extensive use of GetProcAddress (often used to hide API calls)
Drops PE files
Tries to load missing DLLs
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged
Contains functionality to retrieve information about pressed keystrokes
Found large amount of non-executed APIs
Uses Microsoft's Enhanced Cryptographic Provider
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • file.exe (PID: 6100 cmdline: C:\Users\user\Desktop\file.exe MD5: F39DBBCDCAAC9C8D2039B855C752C214)
    • explorer.exe (PID: 3320 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
      • explorer.exe (PID: 1372 cmdline: C:\Windows\SysWOW64\explorer.exe MD5: 166AB1B9462E5C1D6D18EC5EC0B6A5F7)
      • explorer.exe (PID: 4452 cmdline: C:\Windows\explorer.exe MD5: AD5296B280E8F522A8A897C96BAB0E1D)
      • explorer.exe (PID: 1836 cmdline: C:\Windows\SysWOW64\explorer.exe MD5: 166AB1B9462E5C1D6D18EC5EC0B6A5F7)
      • explorer.exe (PID: 4584 cmdline: C:\Windows\explorer.exe MD5: AD5296B280E8F522A8A897C96BAB0E1D)
      • explorer.exe (PID: 3852 cmdline: C:\Windows\SysWOW64\explorer.exe MD5: 166AB1B9462E5C1D6D18EC5EC0B6A5F7)
      • explorer.exe (PID: 2088 cmdline: C:\Windows\SysWOW64\explorer.exe MD5: 166AB1B9462E5C1D6D18EC5EC0B6A5F7)
      • explorer.exe (PID: 4800 cmdline: C:\Windows\SysWOW64\explorer.exe MD5: 166AB1B9462E5C1D6D18EC5EC0B6A5F7)
      • explorer.exe (PID: 1776 cmdline: C:\Windows\explorer.exe MD5: AD5296B280E8F522A8A897C96BAB0E1D)
      • explorer.exe (PID: 2464 cmdline: C:\Windows\SysWOW64\explorer.exe MD5: 166AB1B9462E5C1D6D18EC5EC0B6A5F7)
  • jdggfai (PID: 5952 cmdline: C:\Users\user\AppData\Roaming\jdggfai MD5: F39DBBCDCAAC9C8D2039B855C752C214)
  • cleanup
{"C2 list": ["http://s2scomm20.com/", "http://c2csosi228d.com/", "http://xdd42sdfsdf.com/"]}
SourceRuleDescriptionAuthorStrings
00000009.00000002.407040058.0000000000748000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
  • 0x4a28:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
0000000D.00000002.507736401.0000000000F41000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_SmokeLoaderYara detected SmokeLoaderJoe Security
    00000000.00000002.347095759.00000000020A1000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
      00000000.00000002.347095759.00000000020A1000.00000004.10000000.00040000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
      • 0x374:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
      0000000C.00000000.411589845.00000000009E0000.00000040.80000000.00040000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
      • 0x34:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
      Click to see the 21 entries
      SourceRuleDescriptionAuthorStrings
      9.2.jdggfai.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
        9.3.jdggfai.6f0000.0.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
          0.2.file.exe.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
            0.3.file.exe.5e0000.0.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
              0.2.file.exe.5d0e67.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                Click to see the 1 entries
                No Sigma rule has matched
                No Snort rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: file.exeVirustotal: Detection: 33%Perma Link
                Source: http://c2csosi228d.com/Avira URL Cloud: Label: malware
                Source: file.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Roaming\jdggfaiJoe Sandbox ML: detected
                Source: 00000000.00000002.347095759.00000000020A1000.00000004.10000000.00040000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"C2 list": ["http://s2scomm20.com/", "http://c2csosi228d.com/", "http://xdd42sdfsdf.com/"]}
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 10_2_00CE1765 lstrlen,CryptBinaryToStringA,CryptBinaryToStringA,
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 10_2_00CE118D CryptAcquireContextA,CryptCreateHash,lstrlen,CryptHashData,CryptGetHashParam,wsprintfA,CryptDestroyHash,CryptReleaseContext,
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_009D245E lstrlen,CryptBinaryToStringA,CryptBinaryToStringA,
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_009D2404 lstrlen,CryptStringToBinaryA,CryptStringToBinaryA,CryptStringToBinaryA,
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_009D263E CryptAcquireContextA,CryptCreateHash,lstrlen,CryptHashData,CryptGetHashParam,wsprintfA,CryptDestroyHash,CryptReleaseContext,
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 14_2_003A126D CryptBinaryToStringA,CryptBinaryToStringA,
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_007D25A4 CryptBinaryToStringA,CryptBinaryToStringA,
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_007D2799 CryptAcquireContextA,CryptCreateHash,lstrlen,CryptHashData,CryptGetHashParam,wsprintfA,CryptDestroyHash,CryptReleaseContext,
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 20_2_00571314 lstrlen,CryptBinaryToStringA,CryptBinaryToStringA,
                Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll
                Source: Binary string: C:\cas-rih_casur\velinimuc luzotumez14.pdb source: file.exe, jdggfai.1.dr
                Source: Binary string: bC:\cas-rih_casur\velinimuc luzotumez14.pdb0f source: file.exe, jdggfai.1.dr
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 10_2_00CE14D8 wsprintfW,FindFirstFileW,wsprintfW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 10_2_00CE13FE wsprintfW,FindFirstFileW,wsprintfW,RemoveDirectoryW,FindNextFileW,FindClose,
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 10_2_00CE15BE RtlZeroMemory,SHGetSpecialFolderPathW,lstrcatW,PathCombineW,FindFirstFileW,lstrcmpiW,lstrcmpiW,lstrcmpiW,PathCombineW,PathMatchSpecW,PathCombineW,FindNextFileW,FindClose,
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 14_2_003A1939 wsprintfW,FindFirstFileW,lstrcmpiW,wsprintfW,wsprintfW,wsprintfW,RtlZeroMemory,lstrcat,StrToIntA,PathMatchSpecW,FindNextFileW,FindClose,
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 14_2_003A1936 wsprintfW,FindFirstFileW,lstrcmpiW,wsprintfW,FindNextFileW,FindClose,
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 14_2_003A217C FindFirstFileW,FindNextFileW,FindClose,
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 14_2_003A1FFD FindFirstFileW,FileTimeToLocalFileTime,FileTimeToDosDateTime,FindClose,
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 14_2_003A1B5B GetTempPathW,lstrcatW,CreateDirectoryW,GetLogicalDriveStringsW,GetDriveTypeW,lstrcatW,CreateThread,lstrlenW,WaitForMultipleObjects,CloseHandle,wsprintfW,CreateFileW,GetFileSize,ReadFile,CloseHandle,DeleteFileW,

                Networking

                barindex
                Source: C:\Windows\explorer.exeDomain query: r3oidsofsios.com
                Source: Malware configuration extractorURLs: http://s2scomm20.com/
                Source: Malware configuration extractorURLs: http://c2csosi228d.com/
                Source: Malware configuration extractorURLs: http://xdd42sdfsdf.com/
                Source: Joe Sandbox ViewASN Name: LVLT-10753US LVLT-10753US
                Source: Joe Sandbox ViewIP Address: 185.246.221.151 185.246.221.151
                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://kqgkblakc.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 323Host: r3oidsofsios.com
                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ryjwkat.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 311Host: r3oidsofsios.com
                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ewfonmrybp.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 137Host: r3oidsofsios.com
                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://hraesy.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 179Host: r3oidsofsios.com
                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://vqnwxa.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 307Host: r3oidsofsios.com
                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://sqyiaue.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 288Host: r3oidsofsios.com
                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://cygghp.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 217Host: r3oidsofsios.com
                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://dtxwodx.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 127Host: r3oidsofsios.com
                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://wypuksbjb.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 177Host: r3oidsofsios.com
                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://qgjuekrsef.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 294Host: r3oidsofsios.com
                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://rlovsbdvn.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 350Host: r3oidsofsios.com
                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ugjjaam.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 123Host: r3oidsofsios.com
                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://poflgkd.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 317Host: r3oidsofsios.com
                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://vshacsl.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 190Host: r3oidsofsios.com
                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://kabjenh.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 227Host: r3oidsofsios.com
                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://vyukg.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 329Host: r3oidsofsios.com
                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://xnfwjbsuvp.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 288Host: r3oidsofsios.com
                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://nvftibg.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 185Host: r3oidsofsios.com
                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://okade.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 252Host: r3oidsofsios.com
                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://iungf.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 300Host: r3oidsofsios.com
                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://bhqtkqlvvb.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 218Host: r3oidsofsios.com
                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://whvkq.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 254Host: r3oidsofsios.com
                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://rspyhp.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 161Host: r3oidsofsios.com
                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://jvjyarecuw.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 298Host: r3oidsofsios.com
                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://hrxqxa.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 253Host: r3oidsofsios.com
                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://uwoxt.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 363Host: r3oidsofsios.com
                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://bqruytosp.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 285Host: r3oidsofsios.com
                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://lclth.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 257Host: r3oidsofsios.com
                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://vreqndf.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 261Host: r3oidsofsios.com
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 29 Nov 2022 23:12:31 GMTServer: Apache/2.4.41 (Ubuntu)Connection: closeTransfer-Encoding: chunkedContent-Type: text/html; charset=utf-8Data Raw: 32 37 34 66 65 0d 0a 2f 00 00 00 8f 3b 41 39 46 2c cf 62 b4 69 4c 7a ea be ee 06 5f 4c ee 8e a8 e1 af 06 13 a0 cc 71 e9 ea 11 2f 96 e3 88 cb 32 b7 9a 95 e1 3c f7 13 c7 f8 58 00 ca 74 02 00 1c ac 2b da 00 0b 07 00 09 00 34 00 00 01 54 b5 a6 04 fa 19 13 50 fe ad bf fe 50 01 0b 00 6b 6d 9b a1 be 47 6b 95 bb 2f 20 d4 c8 8f 3e f9 48 d9 5d 6d 65 6d 75 16 dc 93 04 9a 4e 3d 6e 00 a7 fb c4 e6 ba 10 81 4e de c9 81 63 bd 6b c1 21 12 08 03 82 92 b9 66 33 2c c4 d8 a4 26 81 d2 23 e6 f5 f0 39 01 b1 f6 c3 ff ed 03 02 bb a2 cb aa 25 f7 50 36 a5 43 cb 97 a8 89 2f 73 18 41 7c 38 c8 25 6c e3 2a 3c 5c 31 22 93 fa eb 08 47 0a cb 81 c7 f6 64 05 28 c2 6a 21 d2 ce 9f ad 76 7d 4a 1a d8 92 2f 8c 78 c6 24 f2 d6 cf 6b fb c5 e7 05 b0 1f 95 8d a2 26 fc ad 77 7d 1f 5b 65 2f 3f 20 47 56 ae f1 94 d8 e8 af 02 9c 35 87 be c3 a6 6b 91 75 5d 48 ac 3a 7e a2 d9 1c ad 62 4f e2 8d fa e3 a9 4d d6 02 65 2c a5 97 c6 61 03 59 fc 1d d4 88 16 72 64 45 ef 71 50 7d 98 6f 6e 3b 4c 4a 24 46 46 d2 e5 01 0f 29 c5 77 b5 91 d2 cf 70 47 4e 70 90 b9 1a e8 a3 c8 f4 35 b3 7d 94 47 eb 9e 1c 83 1b 9f 2b 04 01 20 1b 5d 82 c5 96 4e c0 54 3b 64 88 1b 82 ad a0 f7 12 e2 23 b3 67 bd 67 b8 6c d5 2e df 89 bb 99 b8 f8 a8 37 72 14 26 37 4c 36 33 93 ea 14 9f fc 79 88 6c 52 f9 4b a8 4b 79 72 fe 17 4a 97 56 fc 2c 49 19 fe ac 9b 63 57 59 57 b2 6d 42 86 48 71 26 85 c8 e9 46 b3 be 7d 6e 49 77 a0 bc d7 28 3b 4d 72 ba 0f 96 20 d8 e2 f0 06 2a 13 f4 31 f3 75 9d 49 ed a3 a9 16 2a be 8b 64 65 69 55 b5 88 be 3d 47 b3 fd d6 b1 69 98 52 de 77 cb ee 26 12 15 57 48 43 74 87 cc a7 87 b5 da 57 bd 62 db 5b 02 16 5b 43 da 83 e9 7d eb 69 ba cb 94 e0 d3 9c 36 d6 e8 5e 61 b8 d3 7c 0b 4f 5f d4 5f 20 84 6f 29 33 35 f8 06 1c 4b 74 4f 8b c3 37 09 e9 f0 3f 99 f4 29 aa d7 6c e4 9b 7d 8d 35 38 05 d8 ed 28 87 b4 7c 23 20 1a 4c 17 4f d3 f2 78 47 99 4d 46 4c ff 34 b5 cf ce 58 f4 58 6b ff 58 95 63 70 fe 45 7b 44 6a 9d 01 70 a4 96 d5 37 e9 53 35 1c ec 0d 77 3d 02 33 8a 5d 4f 02 f9 f2 29 23 5a ba c1 49 cd e4 b9 8f de 25 c8 51 82 ca ba 10 3a 0d e9 c9 3c 79 23 63 02 10 48 3f 91 d7 9d ee 95 29 de 70 a0 eb 9f 55 33 e8 17 3e 67 82 d3 5f 4a b1 d1 1c b2 35 6f e1 d4 36 68 1c b3 19 84 3c 49 ae 3a bf 98 c3 68 29 98 be f9 8d 66 0e 59 d3 88 1d a4 ea 06 bc 7f ab de 5a 8a 42 d8 ab 4a ed 7b 02 99 5f 31 df c6 ae 1b 3c a7 00 1c 42 02 01 1b 9b b8 5a 93 aa ba 49 d3 17 c5 0a f3 97 e0 63 f3 d1 e5 b9 41 bb 2a 06 24 ad af b9 25 17 3b f1 9b 84 1e ce 34 9c 3a 66 91 81 a2 ef 69 19 74 61 e8 33 37 39 af ed b1 65 c2 c3 f9 b0 fa f4 1c 64 c9 43 62 b0 fb e1 82 2e 1e ff a9 5b 8f 2c 06 1c 99 47 12 ba b9 cb de a6 fb 99 d6 48 4c ef 17 cd 38 c0 b1 f7 5c 4d 17 a5 55 86 f6 0f 6e 91 4f 16 df 22 08 2a 6e 37 d0 e4 00 c5 68 60 4a 30 1a 94 6b 3c 70 15 50 86 ac e2 b2 6c 59 c9 04 da 97 f7 61 7d 85 31 2d cb 9f 14 c0 72 fd 91 84 ff e6 9b 97 bb 1d 2c 7e fc 66 96 1e 85 41 67 5c 41 d7 d5 63 7c 55 a6 73 68 f1 7b 06 63
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 29 Nov 2022 23:12:34 GMTServer: Apache/2.4.41 (Ubuntu)Content-Length: 404Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 72 33 6f 69 64 73 6f 66 73 69 6f 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.41 (Ubuntu) Server at r3oidsofsios.com Port 80</address></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 29 Nov 2022 23:12:35 GMTServer: Apache/2.4.41 (Ubuntu)Content-Length: 404Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 72 33 6f 69 64 73 6f 66 73 69 6f 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.41 (Ubuntu) Server at r3oidsofsios.com Port 80</address></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 29 Nov 2022 23:12:35 GMTServer: Apache/2.4.41 (Ubuntu)Content-Length: 404Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 72 33 6f 69 64 73 6f 66 73 69 6f 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.41 (Ubuntu) Server at r3oidsofsios.com Port 80</address></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 29 Nov 2022 23:12:37 GMTServer: Apache/2.4.41 (Ubuntu)Content-Length: 404Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 72 33 6f 69 64 73 6f 66 73 69 6f 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.41 (Ubuntu) Server at r3oidsofsios.com Port 80</address></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 29 Nov 2022 23:12:37 GMTServer: Apache/2.4.41 (Ubuntu)Content-Length: 404Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 72 33 6f 69 64 73 6f 66 73 69 6f 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.41 (Ubuntu) Server at r3oidsofsios.com Port 80</address></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 29 Nov 2022 23:12:37 GMTServer: Apache/2.4.41 (Ubuntu)Content-Length: 404Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 72 33 6f 69 64 73 6f 66 73 69 6f 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.41 (Ubuntu) Server at r3oidsofsios.com Port 80</address></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 29 Nov 2022 23:12:38 GMTServer: Apache/2.4.41 (Ubuntu)Content-Length: 404Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 72 33 6f 69 64 73 6f 66 73 69 6f 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.41 (Ubuntu) Server at r3oidsofsios.com Port 80</address></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 29 Nov 2022 23:12:38 GMTServer: Apache/2.4.41 (Ubuntu)Content-Length: 404Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 72 33 6f 69 64 73 6f 66 73 69 6f 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.41 (Ubuntu) Server at r3oidsofsios.com Port 80</address></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 29 Nov 2022 23:12:38 GMTServer: Apache/2.4.41 (Ubuntu)Content-Length: 404Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 72 33 6f 69 64 73 6f 66 73 69 6f 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.41 (Ubuntu) Server at r3oidsofsios.com Port 80</address></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 29 Nov 2022 23:12:38 GMTServer: Apache/2.4.41 (Ubuntu)Content-Length: 404Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 72 33 6f 69 64 73 6f 66 73 69 6f 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.41 (Ubuntu) Server at r3oidsofsios.com Port 80</address></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 29 Nov 2022 23:12:39 GMTServer: Apache/2.4.41 (Ubuntu)Content-Length: 404Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 72 33 6f 69 64 73 6f 66 73 69 6f 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.41 (Ubuntu) Server at r3oidsofsios.com Port 80</address></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 29 Nov 2022 23:12:39 GMTServer: Apache/2.4.41 (Ubuntu)Content-Length: 404Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 72 33 6f 69 64 73 6f 66 73 69 6f 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.41 (Ubuntu) Server at r3oidsofsios.com Port 80</address></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 29 Nov 2022 23:12:40 GMTServer: Apache/2.4.41 (Ubuntu)Content-Length: 404Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 72 33 6f 69 64 73 6f 66 73 69 6f 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.41 (Ubuntu) Server at r3oidsofsios.com Port 80</address></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 29 Nov 2022 23:12:40 GMTServer: Apache/2.4.41 (Ubuntu)Content-Length: 404Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 72 33 6f 69 64 73 6f 66 73 69 6f 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.41 (Ubuntu) Server at r3oidsofsios.com Port 80</address></body></html>
                Source: explorer.exe, 0000000F.00000002.507850080.00000000031D1000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Referer: %SHost: %shttp://yandex.ru/yandsearchhttp://www.google.com/searchhttp://go.mail.ru/searchhttp://nova.rambler.ru/searchhttp://search.aol.com/aol/searchhttp://search.yahoo.com/search; WOW64; Win64; x64; Trident/7.0; rv:11.0) like Gecko; rv:58.0) Gecko/20100101 Firefox/58.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.140 Safari/537.36) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.140 Safari/537.36 OPR/50.0.2762.67) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299Mozilla/5.0 (Windows NT %d.%d%s%s/<ahref"' >%s%s%shttp:,FFddos_rules=|:|Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like GeckoConnection: close equals www.rambler.ru (Rambler)
                Source: explorer.exe, 0000000F.00000002.507850080.00000000031D1000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Referer: %SHost: %shttp://yandex.ru/yandsearchhttp://www.google.com/searchhttp://go.mail.ru/searchhttp://nova.rambler.ru/searchhttp://search.aol.com/aol/searchhttp://search.yahoo.com/search; WOW64; Win64; x64; Trident/7.0; rv:11.0) like Gecko; rv:58.0) Gecko/20100101 Firefox/58.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.140 Safari/537.36) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.140 Safari/537.36 OPR/50.0.2762.67) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299Mozilla/5.0 (Windows NT %d.%d%s%s/<ahref"' >%s%s%shttp:,FFddos_rules=|:|Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like GeckoConnection: close equals www.yahoo.com (Yahoo)
                Source: explorer.exe, explorer.exe, 0000000F.00000002.507850080.00000000031D1000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://go.mail.ru/search
                Source: explorer.exe, explorer.exe, 0000000F.00000002.507850080.00000000031D1000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://nova.rambler.ru/search
                Source: explorer.exe, 0000000A.00000000.405631874.0000000000CF0000.00000040.80000000.00040000.00000000.sdmp, explorer.exe, 0000000B.00000000.408629568.0000000000D20000.00000040.80000000.00040000.00000000.sdmp, explorer.exe, 0000000B.00000002.508519891.0000000001039000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000C.00000000.411589845.00000000009E0000.00000040.80000000.00040000.00000000.sdmp, explorer.exe, 0000000C.00000002.509151416.00000000032B7000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000D.00000000.414672467.0000000000F50000.00000040.80000000.00040000.00000000.sdmp, explorer.exe, 0000000D.00000002.508405258.0000000001268000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000F.00000000.420288650.00000000031E0000.00000040.80000000.00040000.00000000.sdmp, explorer.exe, 00000010.00000000.423035885.00000000007E0000.00000040.80000000.00040000.00000000.sdmp, explorer.exe, 00000010.00000002.509492375.0000000000C83000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.508629995.0000000000CE8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000011.00000000.425875513.0000000000AE0000.00000040.80000000.00040000.00000000.sdmp, explorer.exe, 00000014.00000000.428749130.0000000000580000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://r3oidsofsios.com/
                Source: explorer.exe, 0000000A.00000000.405631874.0000000000CF0000.00000040.80000000.00040000.00000000.sdmp, explorer.exe, 0000000B.00000000.408629568.0000000000D20000.00000040.80000000.00040000.00000000.sdmp, explorer.exe, 0000000B.00000002.508519891.0000000001039000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000C.00000000.411589845.00000000009E0000.00000040.80000000.00040000.00000000.sdmp, explorer.exe, 0000000C.00000002.509151416.00000000032B7000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000D.00000000.414672467.0000000000F50000.00000040.80000000.00040000.00000000.sdmp, explorer.exe, 0000000D.00000002.508405258.0000000001268000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000F.00000000.420288650.00000000031E0000.00000040.80000000.00040000.00000000.sdmp, explorer.exe, 00000010.00000000.423035885.00000000007E0000.00000040.80000000.00040000.00000000.sdmp, explorer.exe, 00000010.00000002.509492375.0000000000C83000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.508629995.0000000000CE8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000011.00000000.425875513.0000000000AE0000.00000040.80000000.00040000.00000000.sdmp, explorer.exe, 00000014.00000000.428749130.0000000000580000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://r3oidsofsios.com/Mozilla/5.0
                Source: explorer.exe, explorer.exe, 0000000F.00000002.507850080.00000000031D1000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://search.aol.com/aol/search
                Source: explorer.exe, explorer.exe, 0000000F.00000002.507850080.00000000031D1000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://search.yahoo.com/search
                Source: explorer.exe, explorer.exe, 0000000F.00000002.507850080.00000000031D1000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.google.com/search
                Source: unknownHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://kqgkblakc.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 323Host: r3oidsofsios.com
                Source: unknownDNS traffic detected: queries for: r3oidsofsios.com
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 15_2_031D1F2A recv,

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: Yara matchFile source: 0000000D.00000002.507736401.0000000000F41000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000002.507826700.00000000009D1000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 1836, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 4584, type: MEMORYSTR
                Source: Yara matchFile source: 9.2.jdggfai.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.3.jdggfai.6f0000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.3.file.exe.5e0000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.5d0e67.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.jdggfai.6d0e67.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.347095759.00000000020A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.406829127.0000000000700000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000003.388354905.00000000006F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.346666685.00000000005E0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.407192385.00000000020D1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.245341240.00000000005E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000000.338708718.0000000002661000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_007D162B GetKeyboardState,ToUnicode,

                E-Banking Fraud

                barindex
                Source: C:\Windows\SysWOW64\explorer.exeCode function: GetModuleFileNameA,GetCurrentProcessId,wsprintfA,CreateMutexA,GetLastError,RtlInitializeCriticalSection,PathFindFileNameA,lstrcat,Sleep,lstrcmpi,lstrcmpi,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,lstrcmpi,lstrcmpi,lstrcmpi,StrStrIA,GetCommandLineA,GetCommandLineA,StrStrIA,GetModuleHandleA,lstrcmpi,GetCommandLineA,StrStrIA,lstrcmpi,GetCommandLineA,StrStrIA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,RtlExitUserThread,wsprintfA,lstrcmpi,CreateToolhelp32Snapshot,Process32First,FindCloseChangeNotification,Sleep, firefox.exe
                Source: C:\Windows\SysWOW64\explorer.exeCode function: GetModuleFileNameA,GetCurrentProcessId,wsprintfA,CreateMutexA,GetLastError,RtlInitializeCriticalSection,PathFindFileNameA,lstrcat,Sleep,lstrcmpi,lstrcmpi,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,lstrcmpi,lstrcmpi,lstrcmpi,StrStrIA,GetCommandLineA,GetCommandLineA,StrStrIA,GetModuleHandleA,lstrcmpi,GetCommandLineA,StrStrIA,lstrcmpi,GetCommandLineA,StrStrIA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,RtlExitUserThread,wsprintfA,lstrcmpi,CreateToolhelp32Snapshot,Process32First,FindCloseChangeNotification,Sleep, iexplore.exe
                Source: C:\Windows\SysWOW64\explorer.exeCode function: GetModuleFileNameA,GetCurrentProcessId,wsprintfA,CreateMutexA,GetLastError,RtlInitializeCriticalSection,PathFindFileNameA,lstrcat,Sleep,lstrcmpi,lstrcmpi,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,lstrcmpi,lstrcmpi,lstrcmpi,StrStrIA,GetCommandLineA,GetCommandLineA,StrStrIA,GetModuleHandleA,lstrcmpi,GetCommandLineA,StrStrIA,lstrcmpi,GetCommandLineA,StrStrIA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,RtlExitUserThread,wsprintfA,lstrcmpi,CreateToolhelp32Snapshot,Process32First,FindCloseChangeNotification,Sleep, microsoftedgecp.exe
                Source: C:\Windows\SysWOW64\explorer.exeCode function: GetModuleFileNameA,GetCurrentProcessId,wsprintfA,CreateMutexA,GetLastError,RtlInitializeCriticalSection,PathFindFileNameA,lstrcat,Sleep,lstrcmpi,lstrcmpi,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,lstrcmpi,lstrcmpi,lstrcmpi,StrStrIA,GetCommandLineA,GetCommandLineA,StrStrIA,GetModuleHandleA,lstrcmpi,GetCommandLineA,StrStrIA,lstrcmpi,GetCommandLineA,StrStrIA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,RtlExitUserThread,wsprintfA,lstrcmpi,CreateToolhelp32Snapshot,Process32First,FindCloseChangeNotification,Sleep, chrome.exe
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 20_2_0057226C CreateDesktopW,SetThreadDesktop,RtlZeroMemory,RtlZeroMemory,CreateProcessW,ResumeThread,

                System Summary

                barindex
                Source: 00000009.00000002.407040058.0000000000748000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                Source: 00000000.00000002.347095759.00000000020A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 0000000C.00000000.411589845.00000000009E0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 0000000F.00000000.420288650.00000000031E0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000000.00000002.346601770.00000000005D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                Source: 00000009.00000002.406829127.0000000000700000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000000.00000002.346812958.000000000060A000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                Source: 00000010.00000000.423035885.00000000007E0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000000.00000002.346666685.00000000005E0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000014.00000000.428749130.0000000000580000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000009.00000002.406779661.00000000006D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                Source: 00000009.00000002.407192385.00000000020D1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 0000000E.00000000.417608043.00000000003D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 0000000A.00000000.405631874.0000000000CF0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000001.00000000.338708718.0000000002661000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 00000009.00000002.407040058.0000000000748000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                Source: 00000000.00000002.347095759.00000000020A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 0000000C.00000000.411589845.00000000009E0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 0000000F.00000000.420288650.00000000031E0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000000.00000002.346601770.00000000005D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                Source: 00000009.00000002.406829127.0000000000700000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000000.00000002.346812958.000000000060A000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                Source: 00000010.00000000.423035885.00000000007E0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000000.00000002.346666685.00000000005E0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000014.00000000.428749130.0000000000580000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000009.00000002.406779661.00000000006D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                Source: 00000009.00000002.407192385.00000000020D1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 0000000E.00000000.417608043.00000000003D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 0000000A.00000000.405631874.0000000000CF0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000001.00000000.338708718.0000000002661000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 20_2_00572171 StrStrIW,StrStrIW,RtlZeroMemory,ShellExecuteExW,StrStrIW,RtlAdjustPrivilege,ExitWindowsEx,
                Source: C:\Windows\explorer.exeCode function: 11_2_00D173EF
                Source: C:\Windows\explorer.exeCode function: 11_2_00D12450
                Source: C:\Windows\explorer.exeCode function: 11_2_00D12D60
                Source: C:\Windows\explorer.exeCode function: 13_2_00F42860
                Source: C:\Windows\explorer.exeCode function: 13_2_00F42054
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 14_2_003A803C
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 14_2_003A3D28
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 14_2_003AE95C
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 14_2_003AF9F4
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 14_2_003AC392
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 15_2_031D142C
                Source: C:\Windows\explorer.exeCode function: 17_2_00AD2A04
                Source: C:\Windows\explorer.exeCode function: 17_2_00AD20F4
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 20_2_00572ADD
                Source: C:\Windows\SysWOW64\explorer.exeCode function: String function: 003A8E70 appears 32 times
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004015D5 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401602 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401605 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401609 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401613 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401617 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004033CC GetModuleHandleA,GetModuleFileNameW,ExpandEnvironmentStringsW,CreateFileMappingW,GetKeyboardLayoutList,GetTokenInformation,ShellExecuteExW,NtOpenProcess,NtCreateSection,NtAllocateVirtualMemory,NtDuplicateObject,NtQueryInformationProcess,NtOpenKey,NtEnumerateKey,strstr,wcsstr,tolower,towlower,
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004015D4 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004015E0 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004015EA NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004015EE NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00402693 NtOpenKey,NtEnumerateKey,NtEnumerateKey,
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 10_2_00CE3DB7 RtlMoveMemory,RtlMoveMemory,NtUnmapViewOfSection,
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 10_2_00CE20A3 NtCreateSection,NtMapViewOfSection,
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 10_2_00CE213A lstrcmpi,OpenProcess,NtSetInformationProcess,CloseHandle,NtUnmapViewOfSection,NtUnmapViewOfSection,RtlMoveMemory,RtlMoveMemory,RtlMoveMemory,NtUnmapViewOfSection,CloseHandle,CreateMutexA,GetLastError,CloseHandle,Sleep,GetModuleHandleA,GetProcAddress,ReadProcessMemory,WriteProcessMemory,CreateRemoteThread,CloseHandle,Sleep,WriteProcessMemory,CreateRemoteThread,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,
                Source: C:\Windows\explorer.exeCode function: 11_2_00D1527C RtlAllocateHeap,NtUnmapViewOfSection,
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_009D1016 RtlMoveMemory,RtlMoveMemory,NtUnmapViewOfSection,GetCurrentProcessId,lstrcmpi,CreateToolhelp32Snapshot,Process32First,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,Process32Next,FindCloseChangeNotification,Sleep,
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_009D1819 lstrcmpi,OpenProcess,NtSetInformationProcess,CloseHandle,NtUnmapViewOfSection,NtUnmapViewOfSection,RtlMoveMemory,RtlMoveMemory,RtlMoveMemory,NtUnmapViewOfSection,CloseHandle,CreateMutexA,GetLastError,CloseHandle,Sleep,GetModuleHandleA,GetProcAddress,ReadProcessMemory,WriteProcessMemory,CreateRemoteThread,CloseHandle,Sleep,WriteProcessMemory,CreateRemoteThread,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_009D1A80 NtCreateSection,NtMapViewOfSection,
                Source: C:\Windows\explorer.exeCode function: 13_2_00F4355C RtlAllocateHeap,NtUnmapViewOfSection,
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 14_2_003A1EBE RtlMoveMemory,NtUnmapViewOfSection,
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 15_2_031D1016 WSAStartup,RtlMoveMemory,NtUnmapViewOfSection,
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_007D1016 RtlMoveMemory,RtlMoveMemory,NtUnmapViewOfSection,GetCurrentProcessId,wsprintfA,RtlMoveMemory,CreateToolhelp32Snapshot,Process32First,CharLowerA,lstrcmpi,lstrcmpi,Process32Next,CloseHandle,Sleep,
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_007D18BF OpenProcess,NtSetInformationProcess,CloseHandle,NtUnmapViewOfSection,NtUnmapViewOfSection,RtlMoveMemory,RtlMoveMemory,RtlMoveMemory,NtUnmapViewOfSection,CloseHandle,CreateMutexA,GetLastError,CloseHandle,Sleep,GetModuleHandleA,GetProcAddress,ReadProcessMemory,WriteProcessMemory,CreateRemoteThread,CloseHandle,Sleep,WriteProcessMemory,CreateRemoteThread,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_007D1B26 NtCreateSection,NtMapViewOfSection,
                Source: C:\Windows\explorer.exeCode function: 17_2_00AD370C RtlAllocateHeap,NtUnmapViewOfSection,
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 20_2_005726A9 RtlMoveMemory,RtlMoveMemory,NtUnmapViewOfSection,
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 20_2_00571C58 NtCreateSection,NtMapViewOfSection,
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 20_2_00571CEF OpenProcess,CloseHandle,NtUnmapViewOfSection,NtUnmapViewOfSection,RtlMoveMemory,RtlMoveMemory,RtlMoveMemory,NtUnmapViewOfSection,CloseHandle,CreateMutexA,GetLastError,CloseHandle,Sleep,GetModuleHandleA,GetProcAddress,ReadProcessMemory,WriteProcessMemory,CreateRemoteThread,CloseHandle,Sleep,WriteProcessMemory,CloseHandle,CloseHandle,CloseHandle,CloseHandle,
                Source: file.exeStatic PE information: Resource name: RT_VERSION type: x86 executable not stripped
                Source: jdggfai.1.drStatic PE information: Resource name: RT_VERSION type: x86 executable not stripped
                Source: C:\Windows\explorer.exeSection loaded: taskschd.dll
                Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc6.dll
                Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: webio.dll
                Source: C:\Windows\explorer.exeSection loaded: mswsock.dll
                Source: C:\Windows\explorer.exeSection loaded: winnsi.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
                Source: file.exeVirustotal: Detection: 33%
                Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                Source: unknownProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\jdggfai C:\Users\user\AppData\Roaming\jdggfai
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\jdggfaiJump to behavior
                Source: classification engineClassification label: mal100.bank.troj.evad.winEXE@20/3@29/1
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 10_2_00CE3BEA wsprintfA,lstrcmpi,CreateToolhelp32Snapshot,Process32First,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,Process32Next,FindCloseChangeNotification,Sleep,
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll
                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: C:\cas-rih_casur\velinimuc luzotumez14.pdb source: file.exe, jdggfai.1.dr
                Source: Binary string: bC:\cas-rih_casur\velinimuc luzotumez14.pdb0f source: file.exe, jdggfai.1.dr

                Data Obfuscation

                barindex
                Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:EW;
                Source: C:\Users\user\AppData\Roaming\jdggfaiUnpacked PE file: 9.2.jdggfai.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:EW;
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 10_2_00CE4F87 push esp; iretd
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 10_2_00CE9265 push BD6C6D74h; retf
                Source: C:\Windows\explorer.exeCode function: 11_2_00D114D4 push esi; ret
                Source: C:\Windows\explorer.exeCode function: 11_2_00D17197 push esp; iretd
                Source: C:\Windows\explorer.exeCode function: 11_2_00D161A0 push eax; retf
                Source: C:\Windows\explorer.exeCode function: 11_2_00D11405 push esi; ret
                Source: C:\Windows\explorer.exeCode function: 11_2_00D1C877 push edi; ret
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_009D3417 push esp; iretd
                Source: C:\Windows\explorer.exeCode function: 13_2_00F414D4 push esi; ret
                Source: C:\Windows\explorer.exeCode function: 13_2_00F445A7 push esp; iretd
                Source: C:\Windows\explorer.exeCode function: 13_2_00F41405 push esi; ret
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 14_2_003A8EB5 push ecx; ret
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 14_2_003C598F push ebp; retf
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 15_2_031D3527 push esp; iretd
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_007D3627 push esp; iretd
                Source: C:\Windows\explorer.exeCode function: 17_2_00AD1405 push esi; ret
                Source: C:\Windows\explorer.exeCode function: 17_2_00AD14D4 push esi; ret
                Source: C:\Windows\explorer.exeCode function: 17_2_00ADAC8D push esp; iretd
                Source: C:\Windows\explorer.exeCode function: 17_2_00ADAAD2 push ebp; iretd
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 20_2_005743C7 push esp; iretd
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 20_2_00578DD2 push ebp; ret
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 20_2_005793AB push FFFFFFFFh; retf
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 10_2_00CE1FA1 CloseHandle,RtlMoveMemory,LoadLibraryA,GetProcAddress,LdrProcessRelocationBlock,
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\jdggfaiJump to dropped file
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\jdggfaiJump to dropped file

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\file.exeJump to behavior
                Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\jdggfai:Zone.Identifier read attributes | delete
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 10_2_00CE38EA GetModuleFileNameA,GetCurrentProcessId,wsprintfA,CreateMutexA,GetLastError,RtlInitializeCriticalSection,PathFindFileNameA,lstrcat,Sleep,lstrcmpi,lstrcmpi,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,lstrcmpi,lstrcmpi,lstrcmpi,StrStrIA,GetCommandLineA,GetCommandLineA,StrStrIA,GetModuleHandleA,lstrcmpi,GetCommandLineA,StrStrIA,lstrcmpi,GetCommandLineA,StrStrIA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,RtlExitUserThread,wsprintfA,lstrcmpi,CreateToolhelp32Snapshot,Process32First,FindCloseChangeNotification,Sleep,
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: C:\Windows\SysWOW64\explorer.exeEvasive API call chain: CreateMutex,DecisionNodes,Sleep
                Source: C:\Windows\SysWOW64\explorer.exeCode function: GetModuleFileNameA,GetCurrentProcessId,wsprintfA,CreateMutexA,GetLastError,RtlInitializeCriticalSection,PathFindFileNameA,lstrcat,Sleep,lstrcmpi,lstrcmpi,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,lstrcmpi,lstrcmpi,lstrcmpi,StrStrIA,GetCommandLineA,GetCommandLineA,StrStrIA,GetModuleHandleA,lstrcmpi,GetCommandLineA,StrStrIA,lstrcmpi,GetCommandLineA,StrStrIA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,RtlExitUserThread,wsprintfA,lstrcmpi,CreateToolhelp32Snapshot,Process32First,FindCloseChangeNotification,Sleep,
                Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\jdggfaiKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\jdggfaiKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\jdggfaiKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\jdggfaiKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\jdggfaiKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\jdggfaiKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Windows\SysWOW64\explorer.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)
                Source: C:\Windows\explorer.exe TID: 5336Thread sleep count: 650 > 30
                Source: C:\Windows\explorer.exe TID: 4564Thread sleep count: 311 > 30
                Source: C:\Windows\explorer.exe TID: 4564Thread sleep time: -31100s >= -30000s
                Source: C:\Windows\explorer.exe TID: 4536Thread sleep count: 330 > 30
                Source: C:\Windows\explorer.exe TID: 4536Thread sleep time: -33000s >= -30000s
                Source: C:\Windows\explorer.exe TID: 4388Thread sleep count: 505 > 30
                Source: C:\Windows\explorer.exe TID: 4540Thread sleep count: 225 > 30
                Source: C:\Windows\explorer.exe TID: 1868Thread sleep count: 233 > 30
                Source: C:\Windows\SysWOW64\explorer.exe TID: 1368Thread sleep count: 38 > 30
                Source: C:\Windows\SysWOW64\explorer.exe TID: 1368Thread sleep time: -38000s >= -30000s
                Source: C:\Windows\explorer.exe TID: 3896Thread sleep count: 32 > 30
                Source: C:\Windows\explorer.exe TID: 3896Thread sleep time: -32000s >= -30000s
                Source: C:\Windows\SysWOW64\explorer.exe TID: 1840Thread sleep count: 34 > 30
                Source: C:\Windows\SysWOW64\explorer.exe TID: 1840Thread sleep time: -34000s >= -30000s
                Source: C:\Windows\SysWOW64\explorer.exe TID: 3196Thread sleep count: 327 > 30
                Source: C:\Windows\SysWOW64\explorer.exe TID: 3196Thread sleep time: -196200000s >= -30000s
                Source: C:\Windows\SysWOW64\explorer.exe TID: 3196Thread sleep time: -600000s >= -30000s
                Source: C:\Windows\SysWOW64\explorer.exe TID: 2308Thread sleep count: 36 > 30
                Source: C:\Windows\SysWOW64\explorer.exe TID: 2308Thread sleep time: -36000s >= -30000s
                Source: C:\Windows\SysWOW64\explorer.exe TID: 4164Thread sleep count: 36 > 30
                Source: C:\Windows\SysWOW64\explorer.exe TID: 4164Thread sleep time: -36000s >= -30000s
                Source: C:\Windows\explorer.exe TID: 4728Thread sleep count: 35 > 30
                Source: C:\Windows\explorer.exe TID: 4728Thread sleep time: -35000s >= -30000s
                Source: C:\Windows\SysWOW64\explorer.exe TID: 860Thread sleep count: 33 > 30
                Source: C:\Windows\SysWOW64\explorer.exe TID: 860Thread sleep time: -33000s >= -30000s
                Source: C:\Windows\explorer.exeLast function: Thread delayed
                Source: C:\Windows\explorer.exeLast function: Thread delayed
                Source: C:\Windows\explorer.exeLast function: Thread delayed
                Source: C:\Windows\explorer.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\explorer.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\explorer.exeLast function: Thread delayed
                Source: C:\Windows\explorer.exeLast function: Thread delayed
                Source: C:\Windows\explorer.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\explorer.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\explorer.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\explorer.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\explorer.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\explorer.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\explorer.exeLast function: Thread delayed
                Source: C:\Windows\explorer.exeLast function: Thread delayed
                Source: C:\Windows\explorer.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\explorer.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\explorer.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 10_2_00CE16C7 GetCurrentProcessId,GetCurrentThreadId,CreateToolhelp32Snapshot,Thread32First,OpenThread,SuspendThread,ResumeThread,CloseHandle,Thread32Next,CloseHandle,
                Source: C:\Windows\SysWOW64\explorer.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcess
                Source: C:\Windows\SysWOW64\explorer.exeThread delayed: delay time: 600000
                Source: C:\Windows\SysWOW64\explorer.exeThread delayed: delay time: 600000
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 650
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 505
                Source: C:\Windows\SysWOW64\explorer.exeAPI coverage: 7.7 %
                Source: C:\Windows\SysWOW64\explorer.exeAPI coverage: 9.4 %
                Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformation
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 10_2_00CE14D8 wsprintfW,FindFirstFileW,wsprintfW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 10_2_00CE13FE wsprintfW,FindFirstFileW,wsprintfW,RemoveDirectoryW,FindNextFileW,FindClose,
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 10_2_00CE15BE RtlZeroMemory,SHGetSpecialFolderPathW,lstrcatW,PathCombineW,FindFirstFileW,lstrcmpiW,lstrcmpiW,lstrcmpiW,PathCombineW,PathMatchSpecW,PathCombineW,FindNextFileW,FindClose,
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 14_2_003A1939 wsprintfW,FindFirstFileW,lstrcmpiW,wsprintfW,wsprintfW,wsprintfW,RtlZeroMemory,lstrcat,StrToIntA,PathMatchSpecW,FindNextFileW,FindClose,
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 14_2_003A1936 wsprintfW,FindFirstFileW,lstrcmpiW,wsprintfW,FindNextFileW,FindClose,
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 14_2_003A217C FindFirstFileW,FindNextFileW,FindClose,
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 14_2_003A1FFD FindFirstFileW,FileTimeToLocalFileTime,FileTimeToDosDateTime,FindClose,
                Source: C:\Windows\SysWOW64\explorer.exeThread delayed: delay time: 600000
                Source: C:\Windows\SysWOW64\explorer.exeThread delayed: delay time: 600000
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 14_2_003A1B5B GetTempPathW,lstrcatW,CreateDirectoryW,GetLogicalDriveStringsW,GetDriveTypeW,lstrcatW,CreateThread,lstrlenW,WaitForMultipleObjects,CloseHandle,wsprintfW,CreateFileW,GetFileSize,ReadFile,CloseHandle,DeleteFileW,
                Source: C:\Users\user\Desktop\file.exeSystem information queried: ModuleInformation
                Source: C:\Windows\SysWOW64\explorer.exeAPI call chain: ExitProcess graph end node
                Source: C:\Windows\SysWOW64\explorer.exeAPI call chain: ExitProcess graph end node
                Source: explorer.exe, 00000001.00000000.323049259.0000000007AFF000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
                Source: explorer.exe, 00000001.00000000.294853901.000000000057A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                Source: explorer.exe, 00000001.00000000.323241922.0000000007B66000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&0000008
                Source: explorer.exe, 00000001.00000003.301318590.0000000007BB1000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
                Source: explorer.exe, 00000001.00000000.262570544.0000000005EF4000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                Source: explorer.exe, 00000001.00000003.301318590.0000000007BB1000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}E2%d
                Source: explorer.exe, 00000001.00000000.344656957.0000000005F12000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000

                Anti Debugging

                barindex
                Source: C:\Users\user\Desktop\file.exeSystem information queried: CodeIntegrityInformation
                Source: C:\Users\user\AppData\Roaming\jdggfaiSystem information queried: CodeIntegrityInformation
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 14_2_003A9064 _memset,IsDebuggerPresent,
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 10_2_00CE16C7 GetCurrentProcessId,GetCurrentThreadId,CreateToolhelp32Snapshot,Thread32First,OpenThread,SuspendThread,ResumeThread,CloseHandle,Thread32Next,CloseHandle,
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 14_2_003AE09A RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 10_2_00CE1FA1 CloseHandle,RtlMoveMemory,LoadLibraryA,GetProcAddress,LdrProcessRelocationBlock,
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 10_2_00CE1000 GetProcessHeap,RtlAllocateHeap,
                Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPort
                Source: C:\Users\user\AppData\Roaming\jdggfaiProcess queried: DebugPort
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 10_2_00CE1FA1 CloseHandle,RtlMoveMemory,LoadLibraryA,GetProcAddress,LdrProcessRelocationBlock,
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 14_2_003A8D3B SetUnhandledExceptionFilter,UnhandledExceptionFilter,

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Windows\explorer.exeFile created: jdggfai.1.drJump to dropped file
                Source: C:\Windows\explorer.exeDomain query: r3oidsofsios.com
                Source: C:\Users\user\Desktop\file.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
                Source: C:\Users\user\Desktop\file.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read
                Source: C:\Users\user\AppData\Roaming\jdggfaiSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
                Source: C:\Users\user\AppData\Roaming\jdggfaiSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read
                Source: C:\Windows\explorer.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: E2F380
                Source: C:\Windows\explorer.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: E2F380
                Source: C:\Windows\explorer.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: E2F380
                Source: C:\Windows\explorer.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: E2F380
                Source: C:\Windows\explorer.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: E2F380
                Source: C:\Windows\explorer.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: E2F380
                Source: C:\Windows\explorer.exeMemory written: PID: 1372 base: E2F380 value: 90
                Source: C:\Windows\explorer.exeMemory written: PID: 4452 base: 7FF75EDE8150 value: 90
                Source: C:\Windows\explorer.exeMemory written: PID: 1836 base: E2F380 value: 90
                Source: C:\Windows\explorer.exeMemory written: PID: 4584 base: 7FF75EDE8150 value: 90
                Source: C:\Windows\explorer.exeMemory written: PID: 3852 base: E2F380 value: 90
                Source: C:\Windows\explorer.exeMemory written: PID: 2088 base: E2F380 value: 90
                Source: C:\Windows\explorer.exeMemory written: PID: 4800 base: E2F380 value: 90
                Source: C:\Windows\explorer.exeMemory written: PID: 1776 base: 7FF75EDE8150 value: 90
                Source: C:\Windows\explorer.exeMemory written: PID: 2464 base: E2F380 value: 90
                Source: C:\Users\user\Desktop\file.exeThread created: C:\Windows\explorer.exe EIP: 2661A08
                Source: C:\Users\user\AppData\Roaming\jdggfaiThread created: unknown EIP: 46B1A08
                Source: C:\Windows\SysWOW64\explorer.exeCode function: wsprintfA,RtlMoveMemory,CreateToolhelp32Snapshot,Process32First,CharLowerA,lstrcmpi,lstrcmpi,Process32Next,CloseHandle,Sleep, explorer.exe
                Source: C:\Windows\SysWOW64\explorer.exeCode function: RtlMoveMemory,RtlMoveMemory,NtUnmapViewOfSection,GetCurrentProcessId,wsprintfA,RtlMoveMemory,CreateToolhelp32Snapshot,Process32First,CharLowerA,lstrcmpi,lstrcmpi,Process32Next,CloseHandle,Sleep, explorer.exe
                Source: explorer.exe, 00000001.00000000.337344155.0000000000B10000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.257164062.0000000000B10000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.295196336.0000000000B10000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program Manager
                Source: explorer.exe, 00000001.00000000.323317074.0000000007B83000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.301218048.0000000007B83000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.344513618.00000000056F0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                Source: explorer.exe, 00000001.00000000.293996667.00000000004C8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.337344155.0000000000B10000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.256788442.00000000004C8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Progman
                Source: explorer.exe, 00000001.00000000.337344155.0000000000B10000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.257164062.0000000000B10000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.295196336.0000000000B10000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 14_2_003AE7AC cpuid
                Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 14_2_003A8878 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 15_2_031D2297 RtlGetVersion,wsprintfA,

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0000000D.00000002.507736401.0000000000F41000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000002.507826700.00000000009D1000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 1836, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 4584, type: MEMORYSTR
                Source: Yara matchFile source: 9.2.jdggfai.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.3.jdggfai.6f0000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.3.file.exe.5e0000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.5d0e67.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.jdggfai.6d0e67.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.347095759.00000000020A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.406829127.0000000000700000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000003.388354905.00000000006F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.346666685.00000000005E0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.407192385.00000000020D1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.245341240.00000000005E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000000.338708718.0000000002661000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 0000000D.00000002.507736401.0000000000F41000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000002.507826700.00000000009D1000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 1836, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 4584, type: MEMORYSTR
                Source: Yara matchFile source: 9.2.jdggfai.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.3.jdggfai.6f0000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.3.file.exe.5e0000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.5d0e67.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.jdggfai.6d0e67.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.347095759.00000000020A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.406829127.0000000000700000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000003.388354905.00000000006F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.346666685.00000000005E0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.407192385.00000000020D1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.245341240.00000000005E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000000.338708718.0000000002661000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts12
                Native API
                1
                DLL Side-Loading
                1
                DLL Side-Loading
                1
                Deobfuscate/Decode Files or Information
                11
                Input Capture
                1
                System Time Discovery
                Remote Services1
                Archive Collected Data
                Exfiltration Over Other Network Medium3
                Ingress Tool Transfer
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
                System Shutdown/Reboot
                Default Accounts1
                Exploitation for Client Execution
                1
                Create Account
                513
                Process Injection
                2
                Obfuscated Files or Information
                LSASS Memory2
                File and Directory Discovery
                Remote Desktop Protocol11
                Input Capture
                Exfiltration Over Bluetooth2
                Encrypted Channel
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
                Software Packing
                Security Account Manager15
                System Information Discovery
                SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration3
                Non-Application Layer Protocol
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                DLL Side-Loading
                NTDS351
                Security Software Discovery
                Distributed Component Object ModelInput CaptureScheduled Transfer113
                Application Layer Protocol
                SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                File Deletion
                LSA Secrets131
                Virtualization/Sandbox Evasion
                SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common11
                Masquerading
                Cached Domain Credentials13
                Process Discovery
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup Items131
                Virtualization/Sandbox Evasion
                DCSync1
                Application Window Discovery
                Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job513
                Process Injection
                Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
                Hidden Files and Directories
                /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 756298 Sample: file.exe Startdate: 30/11/2022 Architecture: WINDOWS Score: 100 38 Malicious sample detected (through community Yara rule) 2->38 40 Antivirus detection for URL or domain 2->40 42 Multi AV Scanner detection for submitted file 2->42 44 3 other signatures 2->44 7 file.exe 2->7         started        10 jdggfai 2->10         started        process3 signatures4 46 Detected unpacking (changes PE section rights) 7->46 48 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 7->48 50 Maps a DLL or memory area into another process 7->50 12 explorer.exe 3 7->12 injected 52 Machine Learning detection for dropped file 10->52 54 Checks if the current machine is a virtual machine (disk enumeration) 10->54 56 Creates a thread in another existing process (thread injection) 10->56 process5 dnsIp6 30 r3oidsofsios.com 185.246.221.151, 49715, 49716, 49717 LVLT-10753US Germany 12->30 26 C:\Users\user\AppData\Roaming\jdggfai, PE32 12->26 dropped 28 C:\Users\user\...\jdggfai:Zone.Identifier, ASCII 12->28 dropped 58 System process connects to network (likely due to code injection or exploit) 12->58 60 Benign windows process drops PE files 12->60 62 Injects code into the Windows Explorer (explorer.exe) 12->62 64 3 other signatures 12->64 17 explorer.exe 12->17         started        20 explorer.exe 12->20         started        22 explorer.exe 12->22         started        24 6 other processes 12->24 file7 signatures8 process9 signatures10 32 Found evasive API chain (may stop execution after checking mutex) 17->32 34 Checks if browser processes are running 17->34 36 Contains functionality to compare user and computer (likely to detect sandboxes) 17->36

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                file.exe34%VirustotalBrowse
                file.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\jdggfai100%Joe Sandbox ML
                SourceDetectionScannerLabelLinkDownload
                0.2.file.exe.5d0e67.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                0.2.file.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                9.3.jdggfai.6f0000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                9.2.jdggfai.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                0.3.file.exe.5e0000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                9.2.jdggfai.6d0e67.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                SourceDetectionScannerLabelLink
                r3oidsofsios.com3%VirustotalBrowse
                SourceDetectionScannerLabelLink
                http://xdd42sdfsdf.com/1%VirustotalBrowse
                http://s2scomm20.com/1%VirustotalBrowse
                http://c2csosi228d.com/1%VirustotalBrowse
                http://xdd42sdfsdf.com/0%Avira URL Cloudsafe
                http://s2scomm20.com/0%Avira URL Cloudsafe
                http://c2csosi228d.com/100%Avira URL Cloudmalware
                http://r3oidsofsios.com/Mozilla/5.00%Avira URL Cloudsafe
                http://r3oidsofsios.com/0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                r3oidsofsios.com
                185.246.221.151
                truetrueunknown
                NameMaliciousAntivirus DetectionReputation
                http://s2scomm20.com/true
                • 1%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://c2csosi228d.com/true
                • 1%, Virustotal, Browse
                • Avira URL Cloud: malware
                unknown
                http://xdd42sdfsdf.com/true
                • 1%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://r3oidsofsios.com/false
                • Avira URL Cloud: safe
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://go.mail.ru/searchexplorer.exe, explorer.exe, 0000000F.00000002.507850080.00000000031D1000.00000040.80000000.00040000.00000000.sdmpfalse
                  high
                  http://search.yahoo.com/searchexplorer.exe, explorer.exe, 0000000F.00000002.507850080.00000000031D1000.00000040.80000000.00040000.00000000.sdmpfalse
                    high
                    http://www.google.com/searchexplorer.exe, explorer.exe, 0000000F.00000002.507850080.00000000031D1000.00000040.80000000.00040000.00000000.sdmpfalse
                      high
                      http://nova.rambler.ru/searchexplorer.exe, explorer.exe, 0000000F.00000002.507850080.00000000031D1000.00000040.80000000.00040000.00000000.sdmpfalse
                        high
                        http://r3oidsofsios.com/Mozilla/5.0explorer.exe, 0000000A.00000000.405631874.0000000000CF0000.00000040.80000000.00040000.00000000.sdmp, explorer.exe, 0000000B.00000000.408629568.0000000000D20000.00000040.80000000.00040000.00000000.sdmp, explorer.exe, 0000000B.00000002.508519891.0000000001039000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000C.00000000.411589845.00000000009E0000.00000040.80000000.00040000.00000000.sdmp, explorer.exe, 0000000C.00000002.509151416.00000000032B7000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000D.00000000.414672467.0000000000F50000.00000040.80000000.00040000.00000000.sdmp, explorer.exe, 0000000D.00000002.508405258.0000000001268000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000F.00000000.420288650.00000000031E0000.00000040.80000000.00040000.00000000.sdmp, explorer.exe, 00000010.00000000.423035885.00000000007E0000.00000040.80000000.00040000.00000000.sdmp, explorer.exe, 00000010.00000002.509492375.0000000000C83000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000011.00000002.508629995.0000000000CE8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000011.00000000.425875513.0000000000AE0000.00000040.80000000.00040000.00000000.sdmp, explorer.exe, 00000014.00000000.428749130.0000000000580000.00000040.80000000.00040000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://search.aol.com/aol/searchexplorer.exe, explorer.exe, 0000000F.00000002.507850080.00000000031D1000.00000040.80000000.00040000.00000000.sdmpfalse
                          high
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          185.246.221.151
                          r3oidsofsios.comGermany
                          10753LVLT-10753UStrue
                          Joe Sandbox Version:36.0.0 Rainbow Opal
                          Analysis ID:756298
                          Start date and time:2022-11-30 00:10:30 +01:00
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 8m 1s
                          Hypervisor based Inspection enabled:false
                          Report type:light
                          Sample file name:file.exe
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                          Number of analysed new started processes analysed:20
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:1
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Detection:MAL
                          Classification:mal100.bank.troj.evad.winEXE@20/3@29/1
                          EGA Information:
                          • Successful, ratio: 90.9%
                          HDC Information:
                          • Successful, ratio: 40.1% (good quality ratio 29.4%)
                          • Quality average: 41%
                          • Quality standard deviation: 31.6%
                          HCA Information:
                          • Successful, ratio: 100%
                          • Number of executed functions: 0
                          • Number of non-executed functions: 0
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                          • TCP Packets have been reduced to 100
                          • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, ctldl.windowsupdate.com
                          • Execution Graph export aborted for target jdggfai, PID 5952 because it is empty
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size exceeded maximum capacity and may have missing behavior information.
                          TimeTypeDescription
                          00:12:31Task SchedulerRun new task: Firefox Default Browser Agent 3F6E2A49B5A2019A path: C:\Users\user\AppData\Roaming\jdggfai
                          00:12:48API Interceptor329x Sleep call for process: explorer.exe modified
                          No context
                          No context
                          No context
                          No context
                          No context
                          Process:C:\Windows\explorer.exe
                          File Type:data
                          Category:modified
                          Size (bytes):160970
                          Entropy (8bit):7.998679399911187
                          Encrypted:true
                          SSDEEP:3072:Ot6MQNn3XKprOPX+1zMkg7BWTHnMs18vGyMYzZQunMwvY:nN3XMrOv+1zMkg7BWTH1uNZQunbY
                          MD5:3BCD6D6CA7F3787FB48CE0A6ACB9AC0F
                          SHA1:99CC47E2A3229CC1F727AF36607932B562B8EC50
                          SHA-256:39AB690FF5A0633B24065AF986D1DAE4995B57F056776B8BB638833A62FF5B06
                          SHA-512:3CC89A6D55BF632283B2245B288500EFAA9FC75881AC005628971D0C691AA38A2D37F9F343EDC047794A3FD8EA843BF64E1F9302616DBD918BF2D79AF9D44AAD
                          Malicious:false
                          Preview:.2...%.....(.`..."........A~.g......-.......|.-....S.R6g...zow?.-.,yE......X..%....IJT.....~..M.Y..r....Qq.....s...`.....e....U.E.uSl..&WD..2...S.d&x...?#D.a...t...B.O<......Y.}.'.A..N.A.{#I*A.yz...s....M..1m.z.7~.u..*+......&T.x...t....d$..0..x=.(x..It.n....K..*...>15....].G..I.n)+....[%..{:.D....j.].y.U../..i...r.x....h............y.o.K??z.[v........?l.0..q61..C...O..X.m..+...0.L.9!.N...G...J..`.|..C>Y....W._-.^kY.K(....Y..h.F.0.0.d..\P**..{.p.=M,c,..%.}.F.......B.G..Q_24.a.y-.7{7@.Tq.X..,.".F....[..HB.*....P.J....O;........C....O.q......7.+..._.....O|.v.\...........&T..2.u..B..E..l.V.K.....8..+:.C..Y...m..O}..!E.D..g......IVmv.y...3J....#.4l.W6..r......;.X.H....jA..W..8F.$.0.dP..C.u..S.(wq....z..G.....F.6..R.Pa..0x.8."..VT|.....,.[.]..a%*....ZB>B.^.(.....&...jpQ..m.+;T...E..b.7.&....U..=....Nxl#..u.!.Fe..Q.(.H.E`..&.y.".1.!ci.........Z.q....enB......F.u^/.L..O<w..hQ...y.x..8.f.....rW?w.]...........n.L..'..WlR$+p.c....
                          Process:C:\Windows\explorer.exe
                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                          Category:dropped
                          Size (bytes):148992
                          Entropy (8bit):7.085071601621051
                          Encrypted:false
                          SSDEEP:3072:MDxDtsHGGH2wUp5zjLf0+p+4vrtWhqyXV5G0pbCA:atuH2/jLfM4vr0quk0p/
                          MD5:F39DBBCDCAAC9C8D2039B855C752C214
                          SHA1:AB36DA0A55FEAB685587C52BCE5268FCA7EF0E23
                          SHA-256:12675D0F7C4A8D729EDA453AD01697B0790F2921258E9BEFC54CF9327156AA10
                          SHA-512:44419723FFBDF3CAF47FC0902AFD36BCCFE66AD60C150333FDA1EA62DA6410FBEBB805CCF61278CD95FD48F7BA23EDD06857050AB24D069AB6F3D2A8D1854BB0
                          Malicious:true
                          Antivirus:
                          • Antivirus: Joe Sandbox ML, Detection: 100%
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......q.'.5.I.5.I.5.I....4.I.+...$.I.+...].I..]2.2.I.5.H.I.+.....I.+...4.I.+...4.I.Rich5.I.................PE..L.....a.............................L....... ....@.................................G>..........................................P....`..P0...........................................................,..@...............<............................text............................... ..`.data....?... ......................@....rsrc...P0...`...2..................@..@................................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Windows\explorer.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):26
                          Entropy (8bit):3.95006375643621
                          Encrypted:false
                          SSDEEP:3:ggPYV:rPYV
                          MD5:187F488E27DB4AF347237FE461A079AD
                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                          Malicious:true
                          Preview:[ZoneTransfer]....ZoneId=0
                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                          Entropy (8bit):7.085071601621051
                          TrID:
                          • Win32 Executable (generic) a (10002005/4) 99.96%
                          • Generic Win/DOS Executable (2004/3) 0.02%
                          • DOS Executable Generic (2002/1) 0.02%
                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                          File name:file.exe
                          File size:148992
                          MD5:f39dbbcdcaac9c8d2039b855c752c214
                          SHA1:ab36da0a55feab685587c52bce5268fca7ef0e23
                          SHA256:12675d0f7c4a8d729eda453ad01697b0790f2921258e9befc54cf9327156aa10
                          SHA512:44419723ffbdf3caf47fc0902afd36bccfe66ad60c150333fda1ea62da6410fbebb805ccf61278cd95fd48f7ba23edd06857050ab24d069ab6f3d2a8d1854bb0
                          SSDEEP:3072:MDxDtsHGGH2wUp5zjLf0+p+4vrtWhqyXV5G0pbCA:atuH2/jLfM4vr0quk0p/
                          TLSH:40E3DF157291D033E79794315925C3A26BFAF93228B4C94BB7480B7E4FB12D1BA2B307
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......q.'.5.I.5.I.5.I.....4.I.+...$.I.+...].I..]2.2.I.5.H...I.+.....I.+...4.I.+...4.I.Rich5.I.................PE..L......a...........
                          Icon Hash:d4b4b0e8e0eaf0c0
                          Entrypoint:0x404c97
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                          DLL Characteristics:TERMINAL_SERVER_AWARE
                          Time Stamp:0x6183E2E1 [Thu Nov 4 13:40:49 2021 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:5
                          OS Version Minor:0
                          File Version Major:5
                          File Version Minor:0
                          Subsystem Version Major:5
                          Subsystem Version Minor:0
                          Import Hash:2ac0f7085258eff31142b9f87cb0f218
                          Instruction
                          call 00007FF368B207BCh
                          jmp 00007FF368B1A99Dh
                          sub eax, 000003A4h
                          je 00007FF368B1AB44h
                          sub eax, 04h
                          je 00007FF368B1AB39h
                          sub eax, 0Dh
                          je 00007FF368B1AB2Eh
                          dec eax
                          je 00007FF368B1AB25h
                          xor eax, eax
                          ret
                          mov eax, 00000404h
                          ret
                          mov eax, 00000412h
                          ret
                          mov eax, 00000804h
                          ret
                          mov eax, 00000411h
                          ret
                          mov edi, edi
                          push esi
                          push edi
                          mov esi, eax
                          push 00000101h
                          xor edi, edi
                          lea eax, dword ptr [esi+1Ch]
                          push edi
                          push eax
                          call 00007FF368B1BD2Eh
                          xor eax, eax
                          movzx ecx, ax
                          mov eax, ecx
                          mov dword ptr [esi+04h], edi
                          mov dword ptr [esi+08h], edi
                          mov dword ptr [esi+0Ch], edi
                          shl ecx, 10h
                          or eax, ecx
                          lea edi, dword ptr [esi+10h]
                          stosd
                          stosd
                          stosd
                          mov ecx, 00421658h
                          add esp, 0Ch
                          lea eax, dword ptr [esi+1Ch]
                          sub ecx, esi
                          mov edi, 00000101h
                          mov dl, byte ptr [ecx+eax]
                          mov byte ptr [eax], dl
                          inc eax
                          dec edi
                          jne 00007FF368B1AB19h
                          lea eax, dword ptr [esi+0000011Dh]
                          mov esi, 00000100h
                          mov dl, byte ptr [eax+ecx]
                          mov byte ptr [eax], dl
                          inc eax
                          dec esi
                          jne 00007FF368B1AB19h
                          pop edi
                          pop esi
                          ret
                          mov edi, edi
                          push ebp
                          mov ebp, esp
                          sub esp, 0000051Ch
                          mov eax, dword ptr [00422260h]
                          xor eax, ebp
                          mov dword ptr [ebp-04h], eax
                          push ebx
                          push edi
                          lea eax, dword ptr [ebp-00000518h]
                          push eax
                          push dword ptr [esi+04h]
                          call dword ptr [00401170h]
                          mov edi, 00000100h
                          Programming Language:
                          • [ASM] VS2008 build 21022
                          • [ C ] VS2008 build 21022
                          • [IMP] VS2005 build 50727
                          • [C++] VS2008 build 21022
                          • [RES] VS2008 build 21022
                          • [LNK] VS2008 build 21022
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0x10a9c0x50.text
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x560000x3050.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x12800x1c.text
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2cd80x40.text
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x10000x23c.text
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x10000x107d40x10800False0.511911103219697data6.098461593221709IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .data0x120000x43f080x10800False0.9390536221590909data7.820995800308699IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .rsrc0x560000x30500x3200False0.62859375data5.655023153247635IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountry
                          JEBOPOZUSUHARAFA0x584300x55fASCII text, with very long lines (1375), with no line terminatorsRaeto-RomanceSwitzerland
                          RT_ICON0x562b00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0Raeto-RomanceSwitzerland
                          RT_ICON0x569780x568Device independent bitmap graphic, 16 x 32 x 8, image size 0Raeto-RomanceSwitzerland
                          RT_ICON0x56ee00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0Raeto-RomanceSwitzerland
                          RT_ICON0x57f880x468Device independent bitmap graphic, 16 x 32 x 32, image size 0Raeto-RomanceSwitzerland
                          RT_STRING0x58b780x2d8dataRaeto-RomanceSwitzerland
                          RT_STRING0x58e500x1fcdataRaeto-RomanceSwitzerland
                          RT_ACCELERATOR0x589900xa0dataRaeto-RomanceSwitzerland
                          RT_GROUP_ICON0x583f00x3edataRaeto-RomanceSwitzerland
                          RT_VERSION0x58a300x148x86 executable not stripped
                          DLLImport
                          KERNEL32.dllOpenMutexW, GetConsoleAliasExesLengthA, CopyFileExA, ReadConsoleOutputCharacterW, CompareStringW, SetVolumeLabelA, FillConsoleOutputAttribute, GetConsoleTitleA, QueryDosDeviceW, EnumCalendarInfoExA, GetProcessPriorityBoost, IsProcessInJob, AddConsoleAliasW, CreateFileW, SetMailslotInfo, GetWindowsDirectoryW, GetModuleHandleA, GlobalLock, CreateDirectoryExW, GetLogicalDriveStringsA, ReadConsoleInputA, FindNextVolumeMountPointW, OpenWaitableTimerA, GetVersionExA, SearchPathA, MoveFileExW, CallNamedPipeW, GetCurrentDirectoryW, GetDriveTypeA, CreateMailslotA, BuildCommDCBAndTimeoutsA, GetProcAddress, LoadLibraryA, LocalAlloc, GetBinaryTypeA, GetCPInfoExW, WriteConsoleOutputA, GetCommandLineA, EnumDateFormatsW, CancelTimerQueueTimer, GetHandleInformation, FindResourceA, CreateJobObjectA, FindFirstVolumeA, GlobalFlags, CreateNamedPipeW, InterlockedIncrement, CloseHandle, CopyFileW, GetComputerNameExA, GetShortPathNameA, FlushFileBuffers, GetLogicalDriveStringsW, InterlockedCompareExchange, EnumCalendarInfoW, GetConsoleAliasExesLengthW, InterlockedExchange, GetNamedPipeHandleStateW, GetModuleHandleW, GetCurrentActCtx, GenerateConsoleCtrlEvent, MoveFileW, AddAtomA, SetThreadPriority, FreeEnvironmentStringsW, SetConsoleTitleW, SetVolumeMountPointW, VirtualAlloc, _hread, EnumResourceLanguagesW, ClearCommBreak, QueryMemoryResourceNotification, GlobalFindAtomA, HeapWalk, SetFilePointer, GetTickCount, EnumSystemCodePagesW, VerifyVersionInfoA, LoadLibraryW, CreateFileA, GetLastError, WideCharToMultiByte, HeapReAlloc, HeapAlloc, HeapFree, UnhandledExceptionFilter, SetUnhandledExceptionFilter, DeleteFileA, GetStartupInfoA, GetCPInfo, InterlockedDecrement, GetACP, GetOEMCP, IsValidCodePage, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, SetLastError, GetCurrentThreadId, TerminateProcess, GetCurrentProcess, IsDebuggerPresent, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, HeapCreate, VirtualFree, Sleep, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameA, FreeEnvironmentStringsA, GetEnvironmentStrings, GetEnvironmentStringsW, SetHandleCount, GetFileType, QueryPerformanceCounter, GetCurrentProcessId, GetSystemTimeAsFileTime, LCMapStringA, MultiByteToWideChar, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, SetStdHandle, GetConsoleCP, GetConsoleMode, RtlUnwind, InitializeCriticalSectionAndSpinCount, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, HeapSize, ReadFile
                          GDI32.dllGetCharWidthA, GetCharABCWidthsA
                          WINHTTP.dllWinHttpSetOption
                          Language of compilation systemCountry where language is spokenMap
                          Raeto-RomanceSwitzerland
                          TimestampSource PortDest PortSource IPDest IP
                          Nov 30, 2022 00:12:31.871395111 CET4971580192.168.2.7185.246.221.151
                          Nov 30, 2022 00:12:31.898896933 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:31.899008989 CET4971580192.168.2.7185.246.221.151
                          Nov 30, 2022 00:12:31.899173021 CET4971580192.168.2.7185.246.221.151
                          Nov 30, 2022 00:12:31.899214029 CET4971580192.168.2.7185.246.221.151
                          Nov 30, 2022 00:12:31.927711964 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.019617081 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.019654036 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.019699097 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.019731998 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.019763947 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.019814014 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.019828081 CET4971580192.168.2.7185.246.221.151
                          Nov 30, 2022 00:12:32.019865036 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.019881010 CET4971580192.168.2.7185.246.221.151
                          Nov 30, 2022 00:12:32.019922972 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.019973040 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.020023108 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.020193100 CET4971580192.168.2.7185.246.221.151
                          Nov 30, 2022 00:12:32.020194054 CET4971580192.168.2.7185.246.221.151
                          Nov 30, 2022 00:12:32.020194054 CET4971580192.168.2.7185.246.221.151
                          Nov 30, 2022 00:12:32.049228907 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.049278021 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.049432039 CET4971580192.168.2.7185.246.221.151
                          Nov 30, 2022 00:12:32.063112974 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.063162088 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.063194990 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.063226938 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.063270092 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.063287973 CET4971580192.168.2.7185.246.221.151
                          Nov 30, 2022 00:12:32.063287973 CET4971580192.168.2.7185.246.221.151
                          Nov 30, 2022 00:12:32.063322067 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.063375950 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.063420057 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.063424110 CET4971580192.168.2.7185.246.221.151
                          Nov 30, 2022 00:12:32.063476086 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.063510895 CET4971580192.168.2.7185.246.221.151
                          Nov 30, 2022 00:12:32.063527107 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.063576937 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.063594103 CET4971580192.168.2.7185.246.221.151
                          Nov 30, 2022 00:12:32.077265978 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.077397108 CET4971580192.168.2.7185.246.221.151
                          Nov 30, 2022 00:12:32.103285074 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.103332996 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.103414059 CET4971580192.168.2.7185.246.221.151
                          Nov 30, 2022 00:12:32.103981018 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.104018927 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.104049921 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.104083061 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.104089022 CET4971580192.168.2.7185.246.221.151
                          Nov 30, 2022 00:12:32.104115009 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.104135990 CET4971580192.168.2.7185.246.221.151
                          Nov 30, 2022 00:12:32.104149103 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.104181051 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.104212999 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.104257107 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.104283094 CET4971580192.168.2.7185.246.221.151
                          Nov 30, 2022 00:12:32.104289055 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.104435921 CET4971580192.168.2.7185.246.221.151
                          Nov 30, 2022 00:12:32.105029106 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.153188944 CET4971580192.168.2.7185.246.221.151
                          Nov 30, 2022 00:12:32.167846918 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.167993069 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.168015003 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.168034077 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.168060064 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.168078899 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.168123960 CET4971580192.168.2.7185.246.221.151
                          Nov 30, 2022 00:12:32.168191910 CET4971580192.168.2.7185.246.221.151
                          Nov 30, 2022 00:12:32.168214083 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.168236017 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.168257952 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.168283939 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.168302059 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.168308973 CET4971580192.168.2.7185.246.221.151
                          Nov 30, 2022 00:12:32.168322086 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.168344021 CET4971580192.168.2.7185.246.221.151
                          Nov 30, 2022 00:12:32.168376923 CET4971580192.168.2.7185.246.221.151
                          Nov 30, 2022 00:12:32.183612108 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.187916040 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.187942982 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.187997103 CET4971580192.168.2.7185.246.221.151
                          Nov 30, 2022 00:12:32.188143015 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.188165903 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.188286066 CET4971580192.168.2.7185.246.221.151
                          Nov 30, 2022 00:12:32.189188957 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.189212084 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.189233065 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.189255953 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.189276934 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.189282894 CET4971580192.168.2.7185.246.221.151
                          Nov 30, 2022 00:12:32.189299107 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.189321995 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.189342976 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.189347029 CET4971580192.168.2.7185.246.221.151
                          Nov 30, 2022 00:12:32.189364910 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.189372063 CET4971580192.168.2.7185.246.221.151
                          Nov 30, 2022 00:12:32.189450026 CET4971580192.168.2.7185.246.221.151
                          Nov 30, 2022 00:12:32.195622921 CET8049715185.246.221.151192.168.2.7
                          Nov 30, 2022 00:12:32.238928080 CET8049715185.246.221.151192.168.2.7
                          TimestampSource PortDest PortSource IPDest IP
                          Nov 30, 2022 00:12:31.576731920 CET5100753192.168.2.78.8.8.8
                          Nov 30, 2022 00:12:31.867197037 CET53510078.8.8.8192.168.2.7
                          Nov 30, 2022 00:12:32.519501925 CET5051353192.168.2.78.8.8.8
                          Nov 30, 2022 00:12:32.811173916 CET53505138.8.8.8192.168.2.7
                          Nov 30, 2022 00:12:33.003753901 CET6076553192.168.2.78.8.8.8
                          Nov 30, 2022 00:12:33.028825998 CET53607658.8.8.8192.168.2.7
                          Nov 30, 2022 00:12:33.193178892 CET5828353192.168.2.78.8.8.8
                          Nov 30, 2022 00:12:33.212548971 CET53582838.8.8.8192.168.2.7
                          Nov 30, 2022 00:12:33.470622063 CET5002453192.168.2.78.8.8.8
                          Nov 30, 2022 00:12:33.821990967 CET53500248.8.8.8192.168.2.7
                          Nov 30, 2022 00:12:34.020052910 CET4951653192.168.2.78.8.8.8
                          Nov 30, 2022 00:12:34.036792994 CET53495168.8.8.8192.168.2.7
                          Nov 30, 2022 00:12:34.196407080 CET6267953192.168.2.78.8.8.8
                          Nov 30, 2022 00:12:34.488857985 CET53626798.8.8.8192.168.2.7
                          Nov 30, 2022 00:12:34.650456905 CET6139253192.168.2.78.8.8.8
                          Nov 30, 2022 00:12:34.669634104 CET53613928.8.8.8192.168.2.7
                          Nov 30, 2022 00:12:34.832746983 CET5210453192.168.2.78.8.8.8
                          Nov 30, 2022 00:12:34.851197958 CET53521048.8.8.8192.168.2.7
                          Nov 30, 2022 00:12:35.027832985 CET6535653192.168.2.78.8.8.8
                          Nov 30, 2022 00:12:35.319250107 CET53653568.8.8.8192.168.2.7
                          Nov 30, 2022 00:12:35.475203037 CET5900653192.168.2.78.8.8.8
                          Nov 30, 2022 00:12:35.494378090 CET53590068.8.8.8192.168.2.7
                          Nov 30, 2022 00:12:35.653045893 CET5152653192.168.2.78.8.8.8
                          Nov 30, 2022 00:12:35.672054052 CET53515268.8.8.8192.168.2.7
                          Nov 30, 2022 00:12:35.851425886 CET5113953192.168.2.78.8.8.8
                          Nov 30, 2022 00:12:35.871113062 CET53511398.8.8.8192.168.2.7
                          Nov 30, 2022 00:12:36.038981915 CET5878453192.168.2.78.8.8.8
                          Nov 30, 2022 00:12:36.067956924 CET53587848.8.8.8192.168.2.7
                          Nov 30, 2022 00:12:36.250511885 CET5797053192.168.2.78.8.8.8
                          Nov 30, 2022 00:12:36.359834909 CET53579708.8.8.8192.168.2.7
                          Nov 30, 2022 00:12:36.525525093 CET6460853192.168.2.78.8.8.8
                          Nov 30, 2022 00:12:36.543272018 CET53646088.8.8.8192.168.2.7
                          Nov 30, 2022 00:12:36.705869913 CET5874653192.168.2.78.8.8.8
                          Nov 30, 2022 00:12:36.996306896 CET53587468.8.8.8192.168.2.7
                          Nov 30, 2022 00:12:37.164571047 CET6243353192.168.2.78.8.8.8
                          Nov 30, 2022 00:12:37.183329105 CET53624338.8.8.8192.168.2.7
                          Nov 30, 2022 00:12:37.352591038 CET6124853192.168.2.78.8.8.8
                          Nov 30, 2022 00:12:37.373538971 CET53612488.8.8.8192.168.2.7
                          Nov 30, 2022 00:12:37.531023026 CET5275053192.168.2.78.8.8.8
                          Nov 30, 2022 00:12:37.549065113 CET53527508.8.8.8192.168.2.7
                          Nov 30, 2022 00:12:37.720558882 CET6407853192.168.2.78.8.8.8
                          Nov 30, 2022 00:12:37.750535965 CET53640788.8.8.8192.168.2.7
                          Nov 30, 2022 00:12:37.949290991 CET5023153192.168.2.78.8.8.8
                          Nov 30, 2022 00:12:37.969152927 CET53502318.8.8.8192.168.2.7
                          Nov 30, 2022 00:12:38.138925076 CET5851453192.168.2.78.8.8.8
                          Nov 30, 2022 00:12:38.158756018 CET53585148.8.8.8192.168.2.7
                          Nov 30, 2022 00:12:38.340357065 CET5143653192.168.2.78.8.8.8
                          Nov 30, 2022 00:12:38.360474110 CET53514368.8.8.8192.168.2.7
                          Nov 30, 2022 00:12:38.756226063 CET5905353192.168.2.78.8.8.8
                          Nov 30, 2022 00:12:38.774048090 CET53590538.8.8.8192.168.2.7
                          Nov 30, 2022 00:12:38.983336926 CET5194553192.168.2.78.8.8.8
                          Nov 30, 2022 00:12:39.002141953 CET53519458.8.8.8192.168.2.7
                          Nov 30, 2022 00:12:39.224884987 CET6318753192.168.2.78.8.8.8
                          Nov 30, 2022 00:12:39.242450953 CET53631878.8.8.8192.168.2.7
                          Nov 30, 2022 00:12:39.508954048 CET6476053192.168.2.78.8.8.8
                          Nov 30, 2022 00:12:39.526495934 CET53647608.8.8.8192.168.2.7
                          Nov 30, 2022 00:12:40.331233978 CET5363753192.168.2.78.8.8.8
                          Nov 30, 2022 00:12:40.349824905 CET53536378.8.8.8192.168.2.7
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Nov 30, 2022 00:12:31.576731920 CET192.168.2.78.8.8.80xe620Standard query (0)r3oidsofsios.comA (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:32.519501925 CET192.168.2.78.8.8.80x9a00Standard query (0)r3oidsofsios.comA (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:33.003753901 CET192.168.2.78.8.8.80xcb73Standard query (0)r3oidsofsios.comA (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:33.193178892 CET192.168.2.78.8.8.80xd2b9Standard query (0)r3oidsofsios.comA (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:33.470622063 CET192.168.2.78.8.8.80xd702Standard query (0)r3oidsofsios.comA (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:34.020052910 CET192.168.2.78.8.8.80xde7cStandard query (0)r3oidsofsios.comA (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:34.196407080 CET192.168.2.78.8.8.80x80e4Standard query (0)r3oidsofsios.comA (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:34.650456905 CET192.168.2.78.8.8.80x2609Standard query (0)r3oidsofsios.comA (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:34.832746983 CET192.168.2.78.8.8.80xbf35Standard query (0)r3oidsofsios.comA (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:35.027832985 CET192.168.2.78.8.8.80x883fStandard query (0)r3oidsofsios.comA (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:35.475203037 CET192.168.2.78.8.8.80xef7Standard query (0)r3oidsofsios.comA (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:35.653045893 CET192.168.2.78.8.8.80x7e44Standard query (0)r3oidsofsios.comA (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:35.851425886 CET192.168.2.78.8.8.80xb4f1Standard query (0)r3oidsofsios.comA (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:36.038981915 CET192.168.2.78.8.8.80x6dd1Standard query (0)r3oidsofsios.comA (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:36.250511885 CET192.168.2.78.8.8.80x8b45Standard query (0)r3oidsofsios.comA (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:36.525525093 CET192.168.2.78.8.8.80x7568Standard query (0)r3oidsofsios.comA (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:36.705869913 CET192.168.2.78.8.8.80x4443Standard query (0)r3oidsofsios.comA (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:37.164571047 CET192.168.2.78.8.8.80xc6d7Standard query (0)r3oidsofsios.comA (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:37.352591038 CET192.168.2.78.8.8.80x2915Standard query (0)r3oidsofsios.comA (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:37.531023026 CET192.168.2.78.8.8.80x8766Standard query (0)r3oidsofsios.comA (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:37.720558882 CET192.168.2.78.8.8.80xdb37Standard query (0)r3oidsofsios.comA (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:37.949290991 CET192.168.2.78.8.8.80x67f0Standard query (0)r3oidsofsios.comA (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:38.138925076 CET192.168.2.78.8.8.80xebc7Standard query (0)r3oidsofsios.comA (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:38.340357065 CET192.168.2.78.8.8.80xb147Standard query (0)r3oidsofsios.comA (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:38.756226063 CET192.168.2.78.8.8.80x39bdStandard query (0)r3oidsofsios.comA (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:38.983336926 CET192.168.2.78.8.8.80xcceaStandard query (0)r3oidsofsios.comA (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:39.224884987 CET192.168.2.78.8.8.80x2155Standard query (0)r3oidsofsios.comA (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:39.508954048 CET192.168.2.78.8.8.80xa014Standard query (0)r3oidsofsios.comA (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:40.331233978 CET192.168.2.78.8.8.80xec7aStandard query (0)r3oidsofsios.comA (IP address)IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Nov 30, 2022 00:12:31.867197037 CET8.8.8.8192.168.2.70xe620No error (0)r3oidsofsios.com185.246.221.151A (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:32.811173916 CET8.8.8.8192.168.2.70x9a00No error (0)r3oidsofsios.com185.246.221.151A (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:33.028825998 CET8.8.8.8192.168.2.70xcb73No error (0)r3oidsofsios.com185.246.221.151A (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:33.212548971 CET8.8.8.8192.168.2.70xd2b9No error (0)r3oidsofsios.com185.246.221.151A (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:33.821990967 CET8.8.8.8192.168.2.70xd702No error (0)r3oidsofsios.com185.246.221.151A (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:34.036792994 CET8.8.8.8192.168.2.70xde7cNo error (0)r3oidsofsios.com185.246.221.151A (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:34.488857985 CET8.8.8.8192.168.2.70x80e4No error (0)r3oidsofsios.com185.246.221.151A (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:34.669634104 CET8.8.8.8192.168.2.70x2609No error (0)r3oidsofsios.com185.246.221.151A (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:34.851197958 CET8.8.8.8192.168.2.70xbf35No error (0)r3oidsofsios.com185.246.221.151A (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:35.319250107 CET8.8.8.8192.168.2.70x883fNo error (0)r3oidsofsios.com185.246.221.151A (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:35.494378090 CET8.8.8.8192.168.2.70xef7No error (0)r3oidsofsios.com185.246.221.151A (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:35.672054052 CET8.8.8.8192.168.2.70x7e44No error (0)r3oidsofsios.com185.246.221.151A (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:35.871113062 CET8.8.8.8192.168.2.70xb4f1No error (0)r3oidsofsios.com185.246.221.151A (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:36.067956924 CET8.8.8.8192.168.2.70x6dd1No error (0)r3oidsofsios.com185.246.221.151A (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:36.359834909 CET8.8.8.8192.168.2.70x8b45No error (0)r3oidsofsios.com185.246.221.151A (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:36.543272018 CET8.8.8.8192.168.2.70x7568No error (0)r3oidsofsios.com185.246.221.151A (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:36.996306896 CET8.8.8.8192.168.2.70x4443No error (0)r3oidsofsios.com185.246.221.151A (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:37.183329105 CET8.8.8.8192.168.2.70xc6d7No error (0)r3oidsofsios.com185.246.221.151A (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:37.373538971 CET8.8.8.8192.168.2.70x2915No error (0)r3oidsofsios.com185.246.221.151A (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:37.549065113 CET8.8.8.8192.168.2.70x8766No error (0)r3oidsofsios.com185.246.221.151A (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:37.750535965 CET8.8.8.8192.168.2.70xdb37No error (0)r3oidsofsios.com185.246.221.151A (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:37.969152927 CET8.8.8.8192.168.2.70x67f0No error (0)r3oidsofsios.com185.246.221.151A (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:38.158756018 CET8.8.8.8192.168.2.70xebc7No error (0)r3oidsofsios.com185.246.221.151A (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:38.360474110 CET8.8.8.8192.168.2.70xb147No error (0)r3oidsofsios.com185.246.221.151A (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:38.774048090 CET8.8.8.8192.168.2.70x39bdNo error (0)r3oidsofsios.com185.246.221.151A (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:39.002141953 CET8.8.8.8192.168.2.70xcceaNo error (0)r3oidsofsios.com185.246.221.151A (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:39.242450953 CET8.8.8.8192.168.2.70x2155No error (0)r3oidsofsios.com185.246.221.151A (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:39.526495934 CET8.8.8.8192.168.2.70xa014No error (0)r3oidsofsios.com185.246.221.151A (IP address)IN (0x0001)false
                          Nov 30, 2022 00:12:40.349824905 CET8.8.8.8192.168.2.70xec7aNo error (0)r3oidsofsios.com185.246.221.151A (IP address)IN (0x0001)false
                          • kqgkblakc.com
                            • r3oidsofsios.com
                          • ryjwkat.net
                          • ewfonmrybp.org
                          • hraesy.net
                          • vqnwxa.org
                          • sqyiaue.net
                          • cygghp.com
                          • dtxwodx.net
                          • wypuksbjb.org
                          • qgjuekrsef.net
                          • rlovsbdvn.net
                          • ugjjaam.net
                          • poflgkd.org
                          • vshacsl.org
                          • kabjenh.com
                          • vyukg.com
                          • xnfwjbsuvp.com
                          • nvftibg.com
                          • okade.org
                          • iungf.org
                          • bhqtkqlvvb.org
                          • whvkq.com
                          • rspyhp.net
                          • jvjyarecuw.net
                          • hrxqxa.net
                          • uwoxt.net
                          • bqruytosp.com
                          • lclth.com
                          • vreqndf.com

                          Click to jump to process

                          Target ID:0
                          Start time:00:11:25
                          Start date:30/11/2022
                          Path:C:\Users\user\Desktop\file.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Users\user\Desktop\file.exe
                          Imagebase:0x400000
                          File size:148992 bytes
                          MD5 hash:F39DBBCDCAAC9C8D2039B855C752C214
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.347095759.00000000020A1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.347095759.00000000020A1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                          • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.346601770.00000000005D0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                          • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.346812958.000000000060A000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                          • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.346666685.00000000005E0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.346666685.00000000005E0000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                          • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000003.245341240.00000000005E0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:low

                          Target ID:1
                          Start time:00:11:32
                          Start date:30/11/2022
                          Path:C:\Windows\explorer.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\Explorer.EXE
                          Imagebase:0x7ff75ed40000
                          File size:3933184 bytes
                          MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000001.00000000.338708718.0000000002661000.00000020.80000000.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000001.00000000.338708718.0000000002661000.00000020.80000000.00040000.00000000.sdmp, Author: unknown
                          Reputation:high

                          Target ID:9
                          Start time:00:12:31
                          Start date:30/11/2022
                          Path:C:\Users\user\AppData\Roaming\jdggfai
                          Wow64 process (32bit):true
                          Commandline:C:\Users\user\AppData\Roaming\jdggfai
                          Imagebase:0x400000
                          File size:148992 bytes
                          MD5 hash:F39DBBCDCAAC9C8D2039B855C752C214
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000009.00000002.407040058.0000000000748000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                          • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000009.00000002.406829127.0000000000700000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000009.00000002.406829127.0000000000700000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                          • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000009.00000003.388354905.00000000006F0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000009.00000002.406779661.00000000006D0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                          • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000009.00000002.407192385.00000000020D1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000009.00000002.407192385.00000000020D1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                          Antivirus matches:
                          • Detection: 100%, Joe Sandbox ML
                          Reputation:low

                          Target ID:10
                          Start time:00:12:40
                          Start date:30/11/2022
                          Path:C:\Windows\SysWOW64\explorer.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Windows\SysWOW64\explorer.exe
                          Imagebase:0xd70000
                          File size:3611360 bytes
                          MD5 hash:166AB1B9462E5C1D6D18EC5EC0B6A5F7
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 0000000A.00000000.405631874.0000000000CF0000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                          Reputation:high

                          Target ID:11
                          Start time:00:12:43
                          Start date:30/11/2022
                          Path:C:\Windows\explorer.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\explorer.exe
                          Imagebase:0x7ff75ed40000
                          File size:3933184 bytes
                          MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Reputation:high

                          Target ID:12
                          Start time:00:12:44
                          Start date:30/11/2022
                          Path:C:\Windows\SysWOW64\explorer.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Windows\SysWOW64\explorer.exe
                          Imagebase:0xd70000
                          File size:3611360 bytes
                          MD5 hash:166AB1B9462E5C1D6D18EC5EC0B6A5F7
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 0000000C.00000000.411589845.00000000009E0000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                          • Rule: JoeSecurity_SmokeLoader, Description: Yara detected SmokeLoader, Source: 0000000C.00000002.507826700.00000000009D1000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                          Reputation:high

                          Target ID:13
                          Start time:00:12:46
                          Start date:30/11/2022
                          Path:C:\Windows\explorer.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\explorer.exe
                          Imagebase:0x7ff75ed40000
                          File size:3933184 bytes
                          MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_SmokeLoader, Description: Yara detected SmokeLoader, Source: 0000000D.00000002.507736401.0000000000F41000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                          Reputation:high

                          Target ID:14
                          Start time:00:12:47
                          Start date:30/11/2022
                          Path:C:\Windows\SysWOW64\explorer.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Windows\SysWOW64\explorer.exe
                          Imagebase:0xd70000
                          File size:3611360 bytes
                          MD5 hash:166AB1B9462E5C1D6D18EC5EC0B6A5F7
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 0000000E.00000000.417608043.00000000003D0000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                          Reputation:high

                          Target ID:15
                          Start time:00:12:49
                          Start date:30/11/2022
                          Path:C:\Windows\SysWOW64\explorer.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Windows\SysWOW64\explorer.exe
                          Imagebase:0xd70000
                          File size:3611360 bytes
                          MD5 hash:166AB1B9462E5C1D6D18EC5EC0B6A5F7
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 0000000F.00000000.420288650.00000000031E0000.00000040.80000000.00040000.00000000.sdmp, Author: unknown

                          Target ID:16
                          Start time:00:12:50
                          Start date:30/11/2022
                          Path:C:\Windows\SysWOW64\explorer.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Windows\SysWOW64\explorer.exe
                          Imagebase:0xd70000
                          File size:3611360 bytes
                          MD5 hash:166AB1B9462E5C1D6D18EC5EC0B6A5F7
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000010.00000000.423035885.00000000007E0000.00000040.80000000.00040000.00000000.sdmp, Author: unknown

                          Target ID:17
                          Start time:00:12:51
                          Start date:30/11/2022
                          Path:C:\Windows\explorer.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\explorer.exe
                          Imagebase:0x7ff75ed40000
                          File size:3933184 bytes
                          MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language

                          Target ID:20
                          Start time:00:12:52
                          Start date:30/11/2022
                          Path:C:\Windows\SysWOW64\explorer.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Windows\SysWOW64\explorer.exe
                          Imagebase:0xd70000
                          File size:3611360 bytes
                          MD5 hash:166AB1B9462E5C1D6D18EC5EC0B6A5F7
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000014.00000000.428749130.0000000000580000.00000040.80000000.00040000.00000000.sdmp, Author: unknown

                          No disassembly